Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 20:24
Behavioral task
behavioral1
Sample
0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe
-
Size
710KB
-
MD5
0054700707d5b6c6bd34b0b47631124f
-
SHA1
50c25fdb6d972b4b275255b925c0d45e02c9a4e8
-
SHA256
22ef698972355c98c72df206757d3ddbf1ba915975646716ef024bf4487ce9c9
-
SHA512
aac0143e53ccc730c61d7c8b1f405d7f1c3ffef466d8fdc8388ec512af69a9536474e72a556d964a6f1a4b365f43f24b0d6f073e9e601d1919e84c630f7a780e
-
SSDEEP
12288:ytS5RTQ7aT7YilhjzAF4gv6tdiAUQJ0xkaa+MkHAT+pK:6c22T7BRS46qiAUrWLGATZ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/1144-2-0x0000000000170000-0x0000000000228000-memory.dmp modiloader_stage2 behavioral1/memory/1968-3-0x0000000000400000-0x00000000004B8000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1968 set thread context of 1144 1968 0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe 28 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424990517" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEB5B6D1-2E79-11EF-84D8-C2F93164A635} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1144 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1144 1968 0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe 28 PID 1968 wrote to memory of 1144 1968 0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe 28 PID 1968 wrote to memory of 1144 1968 0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe 28 PID 1968 wrote to memory of 1144 1968 0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe 28 PID 1968 wrote to memory of 1144 1968 0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe 28 PID 1144 wrote to memory of 2600 1144 IEXPLORE.EXE 29 PID 1144 wrote to memory of 2600 1144 IEXPLORE.EXE 29 PID 1144 wrote to memory of 2600 1144 IEXPLORE.EXE 29 PID 1144 wrote to memory of 2600 1144 IEXPLORE.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0054700707d5b6c6bd34b0b47631124f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1144 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ab1045d73befe4c5e41487d26d38226
SHA1352fcf6cdf97b860bc667930d588a97082562450
SHA256c103f80196529dcc3b4c6241035e2ae3993d5f010f84b96d638b3d2ca399f5ea
SHA512a0420d295188c241cbecbbc550bfdcf8850f3d7648d94dc40bc4dd9bd1408a9d97acefae945cc3eec63f1a97aba4adf3727964a69af6e9d0e397212531cc5677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b4c6cf4580ed8e2c6c084c01c4952e
SHA14debbc0ff0a7c0775afec7859941353e79fe12ce
SHA2567708cd98a98e45cf562b30b4fb5c7b8a21dacf1347da4fc7c03b30a37a0b0054
SHA512595a1a43c40ea7f6bfed9f06c2c450da72268f99f60cb68d47518d2af927a112e3d67d128cd9223a4e6f4b20b4f6d4c2c8f810fb2530b4aadf9e5714f7a7a645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe22070ecc7bc0fbc9a62f0a0f1e3ea
SHA1f3f8fa480625d4af5ad9f0bc0c58573c82bf91a3
SHA25674407d3c02f0650027b9f816dc7f284456c2560cb75731c93daa82485fbe428e
SHA512c4e927feaff88d67469288df95211670d9b241efe150208d5053e508f32143301f8e02baae812348c35067bc9c7eee8edc518e97ac5df8fd25112f59b13a448b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b5e2b556a39593d67bcfb8e125034c
SHA1dbf2144065a49ab4bb6f50b47b9103bfd5e2985f
SHA256826eabb9e0590514f31598e8b7b81b8e2f6f03576cdf6c6a83740dd9346c0e0f
SHA512946601f21499e8efff390e70ba026aff973979d53fd71b7df4a56480d391f87a2bba6e7473195ee67f3bfdadf69e7f34ab69c58ea9b0f82d50112f2976ca94a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227da828e4cf3b7c04f54613c1db034f
SHA19117328d0706c995da701912e1e2c996a8a28f5d
SHA256ff284fbf82bfb3f9f683be8d99860c072da8510fa55e9ed18241e5b634f6c3e5
SHA5123ac843942a993eef0f2e01974bfaba53e0e3c18adecfaed9d71abf3ab077fcfaad466697fd55b2f406d9e36c4a6563bcf2b98df77b6dcc50c6dc8dce4cd4e1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50319b83a8cf4dc903e825a765215aecb
SHA1d14bbb0ec4cf743429f43c202f92f2dad0e7e0c7
SHA256f1478acd59eaca138eb331f77df020aeb9ac14362cfaa6fdf9899424a6c2d71a
SHA512a206a1353181a929a7b053ec49d804308af72950715fa6fdd5928d84ad2be09e1f9f0e2ef6283b1fee7cee45d9e42327e317f59d56dd9bd1cbb7061e18dbc1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f01cf2f5f92833c0880fe67ec51f47
SHA1eef27ffacd8915b3e78a7d547c5e46e7b2692212
SHA256a0f5e08b174a2605f6747c816192c67b354de7f0d9aab4b930ea46c08e9f401c
SHA5121a21b5c6accf561c0e25fed8374430697e1db385368e39201ca6cc393e0f35eb161347eaffdf87acde9a533798f39453f5af4afd796612436f405ec4dd2e3cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80ab97d617ee0e9f36f40bf9b0e7509
SHA11c3baf9cafa4dd892a89bbeefaec9ec439e4f22f
SHA256f93112866c6a5d663448bd0e122d32490cc502f0440b2113eb574492da735c16
SHA512fe711d138a83064e901df83c9c81c8e36a52c66756ce793c837b7f5f04f1afe768efdbdb16fae9426e2312d404aa81890659706ea9cd677954b12065f76c3901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f26bda660b63c4e71157c55a8459fb
SHA1f9e5f2b9a92aae47a129b55fe211c3e4ef72077f
SHA25669ec8e4cf21cf2990253d104d42c86f6755b047d524baa8dab5730149afdee07
SHA512496d1ba8c4bd9b7bd77d0d31a94d3fae39549307eece2119a488cdad0e830c4dc846eacb397e8873ade537b6d1209051e85d4256ac3bacaf1238dad0183d8964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeec808d2061d1683b6c1aef89ac504c
SHA13b2741bc0b342139b2459c92dd1c78d51f8eeb35
SHA256d39eb7641e575fd32e07a7b752e195d2b2644afd745adcd2077637d984e3ef7f
SHA512f6e489015265a03c814461ebade690ee31bca4dcd7998b4d349a66b998b9c710762a008cd39cc1fd22075339638a1270f2b071d799d59e08954fdd803f992aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3481f86094ecc9fd68bdd67adbaea7
SHA117a837ea02093ada96d0a14492c68e0b77fae204
SHA25647ca63bb2e99f21edd2cc028960b86a8226795be69ba56e9320d7cb6ff023b1b
SHA512d463fffd990161d120de5fb2420ec40a97418cc34649da8aad49d19a140d5585291adb0ad557fe8fc9d80b76e1ab6c6875597f72d5c8c0006961e34928427c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a096c46fb7cd63f616cef661aaa74d0
SHA1bb4b5083f8d9193ea32162d0ca884e605bab8912
SHA25641dbb53ebe58baa2629b80d5fcc668958caf6c2396bdefd144d67efc83408d2b
SHA512e53b767858f7de3b3bd4a41afeb2e95456b2805c0897c88c7913c37bbc7579053e2f3100eae194cb062deae789ef12ba5a3e5518e0145efdaf378d8f75468f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54558d3a059d335bff7ef3d554a942f9d
SHA14edf3bfc3329d9c27397290b202b50523df343ab
SHA256a83747b5c5182feefc285b081fb7a171ff2937dccb753b5ea7b45564a5feda42
SHA5128cffc60e9792cad436ecc91b3ec7e2b0f845ed4e59e7783e6baa943fa2dc996ba6116e9d8cd9913e3acce6aa74166bcf1c764849f2a9153f9809d92c00c607e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535af4f3dd6c6e41800c2c2e72db23138
SHA1288a4d44e1d79e4ef92c98cb6bffe14514a6e1ae
SHA256505651596787492414ce602f6671cf37223cf00d391adcb929598e6cfbe808cf
SHA51238422c032d6c551d22a8d78068b1c23702b2a5d66d430d80102894b0ce4d22b55a98d98b93c86be6cb1c1fd0933c04b4667ad3885c5d9e2658ff34412d955ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfef44f0547b32e9f5011a2451115e05
SHA185ec6b8af75f6749444a010f027f62f35b45cb3a
SHA256eceba880734b4156dd66fd49b79df9cf6f56501dce1b1ee7af0c47090fb9c734
SHA512f52317be8e24d8790ac1702e4e4bd20341f7beff1293b76727b62c1df1c2c3414f6d7585330cc759e334724029627c7198136ede1d3f3b7c49f1964a993ce320
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b