Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 17:39
Behavioral task
behavioral1
Sample
fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe
-
Size
682KB
-
MD5
fd45799c56f0dcd32270e4bf4ea157fa
-
SHA1
49ffb5d87b42245656c4e5635d98b2a5a9e4382e
-
SHA256
33a012eb212119442faeb1886886a1089750d3e656bbf85f353a4521e7e85413
-
SHA512
3fad588b545de3bbe43cee0168dae8b420cccec72a99868f06be1560c111f19b871abb34f56bde48d683c8500664ff265ea9c1157afef7db36dfeb69fa3e94e8
-
SSDEEP
12288:NXWniocbQsVHkmabnl7ssqKp0gM+G4whvSJ7oySY+6ra9q0AlL6kSH1NDFIV:NXkiocksCmabnl7ssqWhU4ue8yJoqckL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tazebama.dl_ -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tazebama.dl_ -
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2592-16-0x0000000000400000-0x000000000048C000-memory.dmp modiloader_stage2 behavioral1/memory/2592-61-0x0000000000400000-0x000000000048C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 5 IoCs
pid Process 2008 tazebama.dl_ 2652 superscan v3.0.exe 2492 ÈÇÊÔ ÕæÊ.exe 2180 ÈÇÊÔ ÕæÊ.exe 1796 ÈÇÊÔ ÕæÊ.exe -
Loads dropped DLL 11 IoCs
pid Process 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 2652 superscan v3.0.exe 2652 superscan v3.0.exe 2652 superscan v3.0.exe 2492 ÈÇÊÔ ÕæÊ.exe 2180 ÈÇÊÔ ÕæÊ.exe -
resource yara_rule behavioral1/files/0x000a00000001540d-62.dat upx behavioral1/memory/2652-68-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2180-120-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2180-115-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2180-121-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2180-133-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2652-155-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: tazebama.dl_ File opened (read-only) \??\R: tazebama.dl_ File opened (read-only) \??\L: tazebama.dl_ File opened (read-only) \??\I: tazebama.dl_ File opened (read-only) \??\U: tazebama.dl_ File opened (read-only) \??\K: tazebama.dl_ File opened (read-only) \??\J: tazebama.dl_ File opened (read-only) \??\H: tazebama.dl_ File opened (read-only) \??\E: tazebama.dl_ File opened (read-only) \??\W: tazebama.dl_ File opened (read-only) \??\V: tazebama.dl_ File opened (read-only) \??\T: tazebama.dl_ File opened (read-only) \??\G: tazebama.dl_ File opened (read-only) \??\M: tazebama.dl_ File opened (read-only) \??\Y: tazebama.dl_ File opened (read-only) \??\X: tazebama.dl_ File opened (read-only) \??\S: tazebama.dl_ File opened (read-only) \??\Q: tazebama.dl_ File opened (read-only) \??\P: tazebama.dl_ File opened (read-only) \??\O: tazebama.dl_ File opened (read-only) \??\N: tazebama.dl_ -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf tazebama.dl_ File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf tazebama.dl_ File opened for modification F:\autorun.inf tazebama.dl_ -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2492 set thread context of 2180 2492 ÈÇÊÔ ÕæÊ.exe 31 PID 2180 set thread context of 1796 2180 ÈÇÊÔ ÕæÊ.exe 32 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\EXCEL.EXE tazebama.dl_ File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\GROOVE.EXE tazebama.dl_ -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2008 tazebama.dl_ 1796 ÈÇÊÔ ÕæÊ.exe 1796 ÈÇÊÔ ÕæÊ.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2492 ÈÇÊÔ ÕæÊ.exe 2180 ÈÇÊÔ ÕæÊ.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2008 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 28 PID 2592 wrote to memory of 2008 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 28 PID 2592 wrote to memory of 2008 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 28 PID 2592 wrote to memory of 2008 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 28 PID 2592 wrote to memory of 2492 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 29 PID 2592 wrote to memory of 2492 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 29 PID 2592 wrote to memory of 2492 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 29 PID 2592 wrote to memory of 2492 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 29 PID 2592 wrote to memory of 2652 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2652 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2652 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2652 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2652 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2652 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2652 2592 fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe 30 PID 2492 wrote to memory of 2180 2492 ÈÇÊÔ ÕæÊ.exe 31 PID 2492 wrote to memory of 2180 2492 ÈÇÊÔ ÕæÊ.exe 31 PID 2492 wrote to memory of 2180 2492 ÈÇÊÔ ÕæÊ.exe 31 PID 2492 wrote to memory of 2180 2492 ÈÇÊÔ ÕæÊ.exe 31 PID 2492 wrote to memory of 2180 2492 ÈÇÊÔ ÕæÊ.exe 31 PID 2492 wrote to memory of 2180 2492 ÈÇÊÔ ÕæÊ.exe 31 PID 2492 wrote to memory of 2180 2492 ÈÇÊÔ ÕæÊ.exe 31 PID 2492 wrote to memory of 2180 2492 ÈÇÊÔ ÕæÊ.exe 31 PID 2492 wrote to memory of 2180 2492 ÈÇÊÔ ÕæÊ.exe 31 PID 2180 wrote to memory of 1796 2180 ÈÇÊÔ ÕæÊ.exe 32 PID 2180 wrote to memory of 1796 2180 ÈÇÊÔ ÕæÊ.exe 32 PID 2180 wrote to memory of 1796 2180 ÈÇÊÔ ÕæÊ.exe 32 PID 2180 wrote to memory of 1796 2180 ÈÇÊÔ ÕæÊ.exe 32 PID 2180 wrote to memory of 1796 2180 ÈÇÊÔ ÕæÊ.exe 32 PID 2180 wrote to memory of 1796 2180 ÈÇÊÔ ÕæÊ.exe 32 PID 2180 wrote to memory of 1796 2180 ÈÇÊÔ ÕæÊ.exe 32 PID 2180 wrote to memory of 1796 2180 ÈÇÊÔ ÕæÊ.exe 32 PID 1796 wrote to memory of 1204 1796 ÈÇÊÔ ÕæÊ.exe 21 PID 1796 wrote to memory of 1204 1796 ÈÇÊÔ ÕæÊ.exe 21 PID 1796 wrote to memory of 1204 1796 ÈÇÊÔ ÕæÊ.exe 21 PID 1796 wrote to memory of 1204 1796 ÈÇÊÔ ÕæÊ.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd45799c56f0dcd32270e4bf4ea157fa_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"3⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\ÈÇÊÔ ÕæÊ.exe"C:\Users\Admin\AppData\Local\Temp\ÈÇÊÔ ÕæÊ.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\ÈÇÊÔ ÕæÊ.exe"C:\Users\Admin\AppData\Local\Temp\ÈÇÊÔ ÕæÊ.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\ÈÇÊÔ ÕæÊ.exe"C:\Users\Admin\AppData\Local\Temp\ÈÇÊÔ ÕæÊ.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\superscan v3.0.exe"C:\Users\Admin\AppData\Local\Temp\superscan v3.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD50071813eb4668769a15fcd2d1ca1686d
SHA1a9a02a14ea4e78af30b8b4a7e1c6ed500a36bc4d
SHA256a4df0e59a28d75e143117051a04d52f4a61a9ea7b23c41ad51a3a829cad62b58
SHA512285f760efac8ccfaba213e88998d37a5e3191071bb245f63d7952b65ec9a1e7ec214270beca65d9a3013db849f64977be7f6110425fd29fcc58eb78cac982e8a
-
Filesize
273KB
MD50df539fe12e647170112b53522e9bc8a
SHA15acbe197c0ae8b5d435b944a3e7107ac64a28976
SHA25620847b0f9546766aeb521e7e1168a29b1249411556898ffdf34d559aab60d469
SHA512a661495768449b1931c319a772f6220fc1d4ed2f100eec5f0fdd839c7f0786c02276539fd6bc1b1dc1b1e478aa446070cecf50a97ab12fa6a9bac86696d46810
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
151KB
MD5f89b6da1406e99e47bee4c13fc06fd8f
SHA1118c6d07224898b2206cade2fe46702b8c17a572
SHA2564b19c14276bc64f40a2d0effaa095b50b8059afd579e48c67eba95ec28b004b2
SHA5125f5023b3fd74e4e5b18a080d164944bf5cad2a54ef28dd81ab5f58e8c0c9e4a8d233b2eb44ca5b7d87469812d3c61608fb641f20649a4a9dcd64b59ba7f640bc
-
Filesize
69KB
MD58ba404e90194c38541e324657e72f74c
SHA1ad9fda28f95b7747579a7fbb8a18e1d1e6311a49
SHA2568145e4c62390f9c55343cc6dadb790dc2cb9463c4f578fa57bf43f12c4720340
SHA5121f594ebb6b970c9cb86b97d642351106a52db407c6e90db7391b50e97a1136e5ba13aeec66c9b985192c377d8c5c70d3746a00f37bcc83855fea316cf8d82362
-
F:\$RECYCLE.BIN\S-1-5-21-2248906074-2862704502-246302768-1000\S-1-5-21-2248906074-2862704502-246302768-1000 .exe
Filesize151KB
MD591a8bce779c8408d10955bfb8950b496
SHA1f0ea5f0452ef811eee609fb8d49f19080c87571b
SHA25692b20a051d9e95de7c2aaf1a5d78cdd914c8d1ea5e73a124c6b267b8d313ea08
SHA512f345ae6d5c43a3efc9a8218d8fdfac398c4d7ad4210bb0ce3e8a65a5722106e404dfaabf8024db9bc5c5e8ada78504d2eed40828beba2857dbc1a23dfbdaeacc
-
Filesize
71KB
MD57446844a4a16e81c2a50c033f9a29c28
SHA19ff1fa63155cfd8d235b39fa56a858bb4c583b82
SHA256375dd1e4b3829eb6dd6b9a5e734b961c530c8a746dfc5bbe8bdde5560dc435c1
SHA512bd4d17604ef7027c43c5b9778426746616c9b6bbd9a8f7dea676c425ebb908c54b2ff3b75a9b6078deb118a6bb7f66e5c2dc705f39b12fe098bfa68e65fcc854
-
Filesize
151KB
MD5f529b0f248564d09e25e4b5e9512a1e6
SHA1efa8a91c9d7a994cea1a80cd3a96dc02a16736c9
SHA256c469346a0134de75110559132779768473662e46df00918737270f57234c5e8a
SHA512b56409adf4e61add1293d20a815429fe36e3838ce17cae1fa34bb47a2565c582c3d50a9a6d18fad04b4e3b716bb03dec1e34ed8bfbba58f8cf2d2970b1ae3d58
-
Filesize
151KB
MD569d4b075fa34e4206285cac5372b4795
SHA194e69fb8921929e7c596c76b26b8e7bfdd5287e9
SHA256395214b163057a35ef43c7b48bfaa47623e92e25849d6a644390b1c893544499
SHA5120b9d01fbeee86463415ac97ac21ecefd4b2982d7fdf1206eee1fb39b73d89a9f96add335ea67a432e91e02f038a7614e232d7c37edbf3360f5ba780c64042306
-
Filesize
151KB
MD5d0571692ad4ef78bf228fa04d0e42c4f
SHA1e0a77445c64afd3b444cbd0dc03f3ba01f93a8a6
SHA256e645073811578d5d7e4ed393be78595da8fe2b7a8cb213ecbdaedce8d37a09c1
SHA51268a293d219e705918d881b1d1415e6c60820998c4c99bb48990a4d70e3b78d5d8e4c4038c0388c2a1dd882cea626507d4da1c2ac8d81fc81803b6e6944770fc1
-
Filesize
32KB
MD5b6a03576e595afacb37ada2f1d5a0529
SHA1d598d4d0e70dec2ffa2849edaeb4db94fedcc0b8
SHA2561707eaf60aa91f3791aa5643bfa038e9d8141878d61f5d701ebac51f4ae7aaad
SHA512181b7cc6479352fe2c53c3630d45a839cdeb74708be6709c2a75847a54de3ffc1fdac8450270dde7174ecb23e5cb002f8ce39032429a3112b1202f3381b8918c