Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe
-
Size
595KB
-
MD5
89463bf46c91af6aa2bb7a4e1a99d2f9
-
SHA1
296a5e209746a2141cf7a4eb7951616252c6d090
-
SHA256
7b5736fa6467b3b9715b0b1c3761937a53952fbd01611dc5d2916efb0b3ed339
-
SHA512
20811928f57978563c5b2df1c74351b6f2e372c903ac3ae66d8063bac12092c605d1a747cc1c4e9ae3ef2eef8c31daa7511e6e0fab137b6130d24368e9a80e48
-
SSDEEP
12288:e/zQayHZOA8GaUV/nKBCY8oAv8+f2/F3Z4mxxtDqVTVOCMg:e70HBday/nKcY40+fQQmXsVTzMg
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/1532-71-0x0000000000400000-0x000000000055E000-memory.dmp modiloader_stage2 behavioral2/memory/2044-77-0x0000000000400000-0x000000000055E000-memory.dmp modiloader_stage2 behavioral2/memory/2044-81-0x0000000000400000-0x000000000055E000-memory.dmp modiloader_stage2 behavioral2/memory/1532-83-0x0000000000400000-0x000000000055E000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2044 rejoice51.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\rejoice51.exe 89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rejoice51.exe 89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rejoice51.exe rejoice51.exe File created C:\Windows\SysWOW64\Delet.bat 89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2044 1532 89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe 87 PID 1532 wrote to memory of 2044 1532 89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe 87 PID 1532 wrote to memory of 2044 1532 89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe 87 PID 1532 wrote to memory of 1868 1532 89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe 88 PID 1532 wrote to memory of 1868 1532 89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe 88 PID 1532 wrote to memory of 1868 1532 89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89463bf46c91af6aa2bb7a4e1a99d2f9_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\rejoice51.exeC:\Windows\system32\rejoice51.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Delet.bat2⤵
- System Location Discovery: System Language Discovery
PID:1868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5fbd4c0c021b4e5a766bf8bb59104e2ca
SHA1a4e6775f24fff77775eca407c1e59c84b450cf57
SHA256deac02e2bd413e741757ffd698fa07b147f51c6b13de871eb65cc21ca60a2a8b
SHA512c5759814f7f84ceda5fa765cbc0f0bbdb21b348fa39ad6a8562a79e1b7363726791b48cd88f58a5f17d722050b3660948e088da7c394f51e60d512d3af48997c
-
Filesize
595KB
MD589463bf46c91af6aa2bb7a4e1a99d2f9
SHA1296a5e209746a2141cf7a4eb7951616252c6d090
SHA2567b5736fa6467b3b9715b0b1c3761937a53952fbd01611dc5d2916efb0b3ed339
SHA51220811928f57978563c5b2df1c74351b6f2e372c903ac3ae66d8063bac12092c605d1a747cc1c4e9ae3ef2eef8c31daa7511e6e0fab137b6130d24368e9a80e48