Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 09:56

General

  • Target

    a65405edaccb7fa540c2376315cf600c_JaffaCakes118.exe

  • Size

    263KB

  • MD5

    a65405edaccb7fa540c2376315cf600c

  • SHA1

    9d169113da953647f10cfa199d9d331f93de7baa

  • SHA256

    07216332a9d386ef89e7ece8d39e39b29f5e3c28866b95cb0377b058b4355858

  • SHA512

    60f089d16dd05cda2a22a036ee97f8cd93c974576ed31fe75e8c882a24f60ee0f3bc72cafe3634ccebceeadd0405e6e7d935293018ab2d24e689c3a7ed610a8d

  • SSDEEP

    6144:366k42WRUZCqxcexcLs8YPSAlIXcIks6aqY0lx:366kwQCrem48AVKXcc

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a65405edaccb7fa540c2376315cf600c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a65405edaccb7fa540c2376315cf600c_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:2340

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\jI82l\PCGWIN32.LI5

      Filesize

      2KB

      MD5

      0c2ba8abb759fb4ed66f34b25ba2712c

      SHA1

      b6fb2891bc2264184a6500f0a3fabd60daa172ec

      SHA256

      6575c3f04533b81aabcbfec07cb0fabd6a27e9a8f02b8aca3bc0db9dbb0b40a6

      SHA512

      4a2eaa7eb015e6587b6ce00e061c66e2e9adca69984834da1d2875f48d27cc40592d32ca2c931cdaf17524707e83270bf08d588aece254ec79218b60938468ad

    • memory/2676-0-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/2676-1-0x000000000040F000-0x0000000000449000-memory.dmp

      Filesize

      232KB

    • memory/2676-2-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/2676-15-0x0000000010410000-0x0000000010449000-memory.dmp

      Filesize

      228KB

    • memory/2676-23-0x000000000040F000-0x0000000000449000-memory.dmp

      Filesize

      232KB

    • memory/2676-22-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB