Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 15:02
Behavioral task
behavioral1
Sample
0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe
-
Size
726KB
-
MD5
0714394b7db4db09309ee67096723c0e
-
SHA1
7903c3111ec507cf266ef88c8ce42145ffca3d10
-
SHA256
ae78f1813c96535532be71ac89259f51b7b84edbaf9fcd2f97db58af04e06e1a
-
SHA512
96bf8c44011a0fba5366c017bfa27f19c4d7374b6e1625b8ad11d26d14ddb3998d5ba493186fe0a4a1c85a0de6ac5ae913fb5a38ef5005e027978050f5f62993
-
SSDEEP
12288:F8k37stBEScWoGdqDkg16l9xneL73U9sPG7SGzJkZqTYEH4K:F8kL0BfTdqDktl3cA+6zJcqTY4b
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/408-15-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 behavioral2/memory/1560-14-0x0000000000C70000-0x0000000000D2C000-memory.dmp modiloader_stage2 -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\H: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\K: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\T: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\U: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\X: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\I: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\L: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\P: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\S: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\Y: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\Z: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\G: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\J: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\M: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\Q: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\R: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\V: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\W: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\A: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\E: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\N: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened (read-only) \??\O: 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AutoRun.inf 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe File opened for modification F:\AutoRun.inf 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 408 set thread context of 1560 408 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe 81 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31114018" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3958618660" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425660715" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1791567C-2F16-11EF-A084-E20E9B62A9C1} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31114018" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3960806197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31114018" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3958618660" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1560 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 3676 IEXPLORE.EXE 3676 IEXPLORE.EXE 3676 IEXPLORE.EXE 3676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 408 wrote to memory of 1560 408 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe 81 PID 408 wrote to memory of 1560 408 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe 81 PID 408 wrote to memory of 1560 408 0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe 81 PID 1560 wrote to memory of 3676 1560 IEXPLORE.EXE 82 PID 1560 wrote to memory of 3676 1560 IEXPLORE.EXE 82 PID 1560 wrote to memory of 3676 1560 IEXPLORE.EXE 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0714394b7db4db09309ee67096723c0e_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:408 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD57d3b85dddbdd4fdb82ea4c9e4eb4b386
SHA1ec55434869bf1ce79d37ebc36af1cea98309ca89
SHA2569ff2020f99ff7cefa80d5551715f465a89592320ea24e72c001e11a216445cb1
SHA5120d595242ed30e20906f2f50fd4fe454a963498bb07a34b2b892d9fe5a2cb7b76d195ac766342034b422e3d3705c7760ebaa5fdc4a9076f60dfa7c61336d51d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5ca69d480e6d157e97a7dc2f6629196ac
SHA10c370ca0edc6cdf5582c5200a915474d942bf764
SHA2563a3cb844459a73383998f279beecfbcae5efda1651ea5f13bb36d0f5e826fe54
SHA5126e31b5bf2361b1b1f28908b46159a6ab97544815753d276a8bbe16f341da177aabf8840de0a5b439f282d8725731773eae3ee6d1f3029c17ab8316dde5cb17f3
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
81B
MD5400209ebd824aeeb7633f6640322e89d
SHA1e7d7e83f618e9ffcce5c332992fe34dbd8be9ce8
SHA256e7c5b1bccffef005c0da369a4bc1ce6beafff8298b3d253bb6b1dabd672b304d
SHA512e046c0662d5f2ba9399278102ff8fcf685ea13a63980ebb85898ad23ab67e620e2264a07d88b5a6e33d34d9263eaabc7cde921621f1efefbaec5b54a7af948c0