Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
70s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe
-
Size
293KB
-
MD5
96a35777256b0ca9dffe94aa45b1f99a
-
SHA1
cdc9c276979612b03ee92d48a63892ae0209e6c4
-
SHA256
e9efdeb32f97783abfe6250b785d43fd1a38329d34d3bc13656cb37625820e63
-
SHA512
54cd8262864a92f7384d0f8c55e7b2d0c4a1ef45855d47cb2089a2590df839bdb4643e772053acd99fc3f22d2f0b1054803dacd0ec9145ea0708a7e960322d31
-
SSDEEP
6144:zq3qfVvOdaEAvID4sicwdRCms1h3Axyw4f1f:cqfxrIBivR01htfF
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2140-2-0x0000000000400000-0x0000000000513000-memory.dmp modiloader_stage2 behavioral1/memory/2140-6-0x0000000000400000-0x0000000000513000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2140 set thread context of 2164 2140 96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe 29 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt 96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3988B81-5A50-11EF-960D-6A8D92A4B8D0} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429810737" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2164 2140 96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2164 2140 96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2164 2140 96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2164 2140 96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2164 2140 96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe 29 PID 2164 wrote to memory of 2848 2164 IEXPLORE.EXE 30 PID 2164 wrote to memory of 2848 2164 IEXPLORE.EXE 30 PID 2164 wrote to memory of 2848 2164 IEXPLORE.EXE 30 PID 2164 wrote to memory of 2848 2164 IEXPLORE.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae5474563241b2e552c3d908d235af48
SHA1ff27a0b07971f40b5ed165ca493ca4481124a19f
SHA2567f60e5fb23a0238ba4643bf39c42b3e218c65bb448706056c9e5912463f2db31
SHA512ca89f4d55386d61eb63d492a5d81687aa891ab6f865589599779b0ac237ef65a867f32bbd7ca7c826104f53072c1b33ac1492fb6fca7e76559919be820ea5320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec14f9a7728bcc76d1c1c3ae6294379
SHA1a4dd81970c6cbf03874854199ad93f2ee1d9178d
SHA256bc06ca0c61e3ceb07f1bca997aa2ea4eda0a0298d4d2cedd4381a109faa0c23c
SHA512b895b78b32d55cf77e55a1c5cb4a8fa2f93f0a8a283b994945ed0295e481d7588b9dbebd145eb47d695eb2b944516bda7cc8436aff030c652dca608a31ea4d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e1d6f9b2d388b83415a72ed0da0209c
SHA1954c3cb6ec419c7f5a951d5c99701e14a505adc0
SHA25656a206922b77355da8c3487b5a322a33b7580435bb2106003bf815d354082f65
SHA51241a710a6cc5b709662dfd27cc7aae8ad41ef1922fcd722cc226ef408ff589e90e8779d77c45353b5557910b324f780d2e08bf0ed1af1470ccd686be2da8f605e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a797e4c093971ede1d19102ab6bc46a0
SHA1831aef8d74f8904afc4bd02b1cc525d198a5967d
SHA2563fc007a6d83f9244c5b76dfbd9aa040d92a8d9d38824da2f32dbd5ee2f3b0c69
SHA5127d2ab7b6f6c5128a83d8220d1e76d25c1934873c37d6f150072d28734a390db7394ae697dbdee48edf515e02655e19a19cfc59452254122cf7f432f99aed45e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a8f898943d33b53197eae6fa1bcbf1d
SHA1678734332c51db29d3369bfb1672b31e013ca63a
SHA256ce41a5f8a1e343f87632db87f8b45a81412a0a1a15712fc9dc66ad902e14ccda
SHA5124b833f97d6206b5835f734d33e40c45145ee3f878bca25fd6fbef7b89f0052f7345bdee59a61333bbc25bd62986d459b9c7abacea6f86082b8f68d27c47009c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543c362632dacfb3ef6c8972efef2bf3a
SHA1a1fed32ef1ba9943ebd209a415954a8dd887b030
SHA256b76ed025f730ccc8b736c215222c196c7b44b0a138b37a910f644f5f63d2eb93
SHA512b5b3060d95eb88ee76fdd6979db31a2b126ea54a8b30fcf1653dc4628e1b540cb386c94337a7fb722806736d272e1d329a104d88d31d2f44c881e93817354292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596bbcbd8f429f36979276f1657dc6581
SHA1a13be1583dcd2dac9abe964e382ae53fa954319a
SHA25618ba7c43fc23ad7b22bf82b56c23a2fc4b95dc92897135499103dadfca5395e1
SHA51240218d452aa5a79fa20554e819e62afcf197ca5988881d0bb0295dac7f4ebbaf06412a37e341a1f2e6eb2cdd1edb1cdbb26766803abcac67738c685c54cffae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752f823effb1b80a7c50ecd7dd8ea302
SHA1b199dfa2acc8455e970adbad75dce0bc6207bb47
SHA256a4f0fa12cd013a708f92cc806df0b65058ced0a7142dfa2bb05557250485163b
SHA512ea799f7d27a73b222b89b00367615f56f89273c2dffe34e17cda7d8835fd0f0a8621a43caa3da3755c4880aa4763f035d0ab6e1613811b8ddc8f8010a3df76f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff70528328b11689292afbfc6853dab7
SHA159a082a073f4c213b6ec48599f95744e79788525
SHA2565c71b1d950a1f3192f2764b3946241a3fb5743242e502ffabbeffaf0e892df7d
SHA5125d306edbf197da6813c9d7e6a5f64404dea4b6895cd5f3249600beab37603a73c0ba9411f263518b1b6cd16fd028c62872f5cdfc0afac82b3c648eaf218e210e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1e828f9850ee39803cd9a247b75ac4
SHA1b58d2c73b3e7f9c21570b21769a0299a63d0cdb1
SHA256a6b828e1081d8aa10256b2e34f8a764dfc7a4ebbb10e35bd7ee1b50ea05aa933
SHA512be0d27e935aca6569dbf312562f21f1b83d86306b44f10f281822f18fdf206ddf41e6d12185545bc1e65a847bb1cf6796909d9b0913e1179c7c867043d6f4c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c87736fe4996cebb30c124507d6b77
SHA10b62049c262f45af141e60009ce7a1078ee075f2
SHA256e2044ee68d10183086f614e1a9661a5c1714223d80778fbd30d4740b83cb32b3
SHA51293edaa2b37cf6118abd46f7fabffdba60e456ef0dfe4ddf23792b9699d928e7fbaa01325b905fdc1d7db76c66d75b3cb383d49a596772c9b5be2da5db57d90cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c874116c045d42ad59bef92b006ec5
SHA114c3310321922bdbf68eded381df3d476b364426
SHA256a58a417ad7dec3c40d3fefb95f67a0c243d3795ba506f0151ad2179e758f9e04
SHA51288f1a601b4c582435860812f2856f12f23000c575a39fb6ecba5e6f8e87b763342cc64185bffa948afcf41a4d736db1cea2b17b6d81deaa6b8a39fc4af345f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589129329ef662af10fa4c6d32aec88c1
SHA1cb24e284dc50bbf8be56064ffb47979bfded3f20
SHA256acf270ba4541b484e039a4405360eba55ddc8783d9a39d60f66807b9eae10bb4
SHA512eb5b1dcc02e32f11e583ef3082bac34575883cd6f73f53a148ba59c326a07b8de5fdc844a72c1af1ef03b3f9bef99d3785df7d1bed7ff44ee050807400cae199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f1863f512d8a73f5cb2c0cbcf98371
SHA17928a252e7cc500ccd2148283a0611c676b9398b
SHA256befb7b1fc7a4871cc8dc5211f59083f4392b439486af30304d5c31296d62a11c
SHA512f26bddab342815ba151bbf3404a8d926d25783396fe1fee926a2370d0ad5f9989c22d7344e704cb02b1451958b848cbae9c128884e03df1ca517aba70c7a16aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042014417a076fbf1344f4a935b12167
SHA1b19a408912338d5b3d606fa545ef8dcb53ac27d7
SHA25628e7d772d7ce3ecd229dec2eba16e2474744dd9c2d30fa7f8035a40c4301fd9d
SHA512674869733b8f189c29b7970776adb535833f9a495d994b2a602c33ee566aac3572ce6a059a5535b9d744141185b2bda9b5a0de434b24bd019aee7a7ecc3c6fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5732521b0eeffcd0649d564b6a3b19444
SHA116dff8002c690c6a0f8339b0685311b1d3332e31
SHA256c8956cae45fcfce96421f8ef18a0015a074085758ecb13a46e13fc3dee33dcb8
SHA5128675ca00660ec473ff3195da691a59960930f84e2fc016a9d5b909df6272b70ea7398d70460bff4a983ff17d5653e6948498d1b5efd7cc5a904c6d905025a431
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b