Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
21a5098cc6c6e9a3095640dcae3b2ece
-
SHA1
ebf01e53bbde0388540d8b2ef84bc1c637dd5f42
-
SHA256
1b7f9bafca8fc8630750943bb841999ea94e1d19d94337c607d2974a970bfedb
-
SHA512
ad214d45b8a6ad307d6056698cd7579eadab7ec2df65d154c4b6788e494b5cdb02511de99fe44093c21dc841fc5d993167fafe0439ff8a8ea1e84fd6d5f74abc
-
SSDEEP
24576:420BiFX13wcZ/WI1BUIUgdgc+m3DFr0yjKFvyNhf6Yzy79LLbm:43zgFoy6ohCYzy5Lf
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe -
ModiLoader Second Stage 25 IoCs
resource yara_rule behavioral1/memory/3012-1-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-0-0x0000000000401000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral1/memory/3012-2-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-8-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-13-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-9-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-14-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-15-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-16-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-19-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-20-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-21-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-24-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-25-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-28-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-31-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-34-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-37-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-40-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-43-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-46-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-49-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-52-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-55-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral1/memory/3012-58-0x0000000000400000-0x0000000000553000-memory.dmp modiloader_stage2 -
Loads dropped DLL 2 IoCs
pid Process 3012 21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe 3012 21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\VMPipe32.dll 21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3012 21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe Token: SeDebugPrivilege 3012 21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe 3012 21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21a5098cc6c6e9a3095640dcae3b2ece_JaffaCakes118.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5e0bc2068e4b983eae1650ef6ace79734
SHA1441138ed08054e7937a9a5be4474ef82a15195b9
SHA25668fba6801d4f47d05b9218ca1e29c2b766f9e26d71947681ea740870ea31a2dd
SHA512bbfb2e7a7d91cbee33619d3a4a7b784eb32227f91813a64a5774c1e89c5d3bd952f15af9a9c150d787fa9b100fa6625b5f6c4e3232ebaa80183d18d93f3ebb6f
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350