Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 06:03

General

  • Target

    89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe

  • Size

    595KB

  • MD5

    89463bf46c91af6aa2bb7a4e1a99d2f9

  • SHA1

    296a5e209746a2141cf7a4eb7951616252c6d090

  • SHA256

    7b5736fa6467b3b9715b0b1c3761937a53952fbd01611dc5d2916efb0b3ed339

  • SHA512

    20811928f57978563c5b2df1c74351b6f2e372c903ac3ae66d8063bac12092c605d1a747cc1c4e9ae3ef2eef8c31daa7511e6e0fab137b6130d24368e9a80e48

  • SSDEEP

    12288:e/zQayHZOA8GaUV/nKBCY8oAv8+f2/F3Z4mxxtDqVTVOCMg:e70HBday/nKcY40+fQQmXsVTzMg

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 4 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\SysWOW64\rejoice51.exe
      C:\Windows\system32\rejoice51.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2880
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\Delet.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Delet.bat

    Filesize

    212B

    MD5

    fbd4c0c021b4e5a766bf8bb59104e2ca

    SHA1

    a4e6775f24fff77775eca407c1e59c84b450cf57

    SHA256

    deac02e2bd413e741757ffd698fa07b147f51c6b13de871eb65cc21ca60a2a8b

    SHA512

    c5759814f7f84ceda5fa765cbc0f0bbdb21b348fa39ad6a8562a79e1b7363726791b48cd88f58a5f17d722050b3660948e088da7c394f51e60d512d3af48997c

  • \Windows\SysWOW64\rejoice51.exe

    Filesize

    595KB

    MD5

    89463bf46c91af6aa2bb7a4e1a99d2f9

    SHA1

    296a5e209746a2141cf7a4eb7951616252c6d090

    SHA256

    7b5736fa6467b3b9715b0b1c3761937a53952fbd01611dc5d2916efb0b3ed339

    SHA512

    20811928f57978563c5b2df1c74351b6f2e372c903ac3ae66d8063bac12092c605d1a747cc1c4e9ae3ef2eef8c31daa7511e6e0fab137b6130d24368e9a80e48

  • memory/1656-7-0x0000000001F00000-0x0000000001F01000-memory.dmp

    Filesize

    4KB

  • memory/1656-22-0x0000000000400000-0x000000000055E000-memory.dmp

    Filesize

    1.4MB

  • memory/1656-19-0x00000000033A0000-0x00000000033A1000-memory.dmp

    Filesize

    4KB

  • memory/1656-18-0x00000000033A0000-0x00000000033A1000-memory.dmp

    Filesize

    4KB

  • memory/1656-17-0x00000000033A0000-0x00000000033A1000-memory.dmp

    Filesize

    4KB

  • memory/1656-16-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/1656-15-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/1656-14-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/1656-13-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/1656-12-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/1656-11-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/1656-10-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/1656-9-0x0000000002140000-0x0000000002141000-memory.dmp

    Filesize

    4KB

  • memory/1656-8-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/1656-20-0x00000000033A0000-0x00000000033A1000-memory.dmp

    Filesize

    4KB

  • memory/1656-0-0x0000000000400000-0x000000000055E000-memory.dmp

    Filesize

    1.4MB

  • memory/1656-32-0x0000000003FC0000-0x000000000411E000-memory.dmp

    Filesize

    1.4MB

  • memory/1656-4-0x0000000001F10000-0x0000000001F11000-memory.dmp

    Filesize

    4KB

  • memory/1656-3-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1656-2-0x00000000005C0000-0x00000000005C1000-memory.dmp

    Filesize

    4KB

  • memory/1656-6-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1656-21-0x00000000033A0000-0x00000000033A1000-memory.dmp

    Filesize

    4KB

  • memory/1656-5-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/1656-31-0x0000000003FC0000-0x000000000411E000-memory.dmp

    Filesize

    1.4MB

  • memory/1656-47-0x0000000000400000-0x000000000055E000-memory.dmp

    Filesize

    1.4MB

  • memory/1656-48-0x0000000000560000-0x00000000005B4000-memory.dmp

    Filesize

    336KB

  • memory/1656-1-0x0000000000560000-0x00000000005B4000-memory.dmp

    Filesize

    336KB

  • memory/2880-35-0x0000000000400000-0x000000000055E000-memory.dmp

    Filesize

    1.4MB

  • memory/2880-45-0x0000000000400000-0x000000000055E000-memory.dmp

    Filesize

    1.4MB

  • memory/2880-34-0x0000000000400000-0x000000000055E000-memory.dmp

    Filesize

    1.4MB