Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 09:56

General

  • Target

    a65405edaccb7fa540c2376315cf600c_JaffaCakes118.exe

  • Size

    263KB

  • MD5

    a65405edaccb7fa540c2376315cf600c

  • SHA1

    9d169113da953647f10cfa199d9d331f93de7baa

  • SHA256

    07216332a9d386ef89e7ece8d39e39b29f5e3c28866b95cb0377b058b4355858

  • SHA512

    60f089d16dd05cda2a22a036ee97f8cd93c974576ed31fe75e8c882a24f60ee0f3bc72cafe3634ccebceeadd0405e6e7d935293018ab2d24e689c3a7ed610a8d

  • SSDEEP

    6144:366k42WRUZCqxcexcLs8YPSAlIXcIks6aqY0lx:366kwQCrem48AVKXcc

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a65405edaccb7fa540c2376315cf600c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a65405edaccb7fa540c2376315cf600c_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:5036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\jI82l\PCGWIN32.LI5

      Filesize

      2KB

      MD5

      51516adeb4a101bc3318238e071c7941

      SHA1

      cefc83a357a1d88ea0c356ee7aa18fc6d33d4c3b

      SHA256

      e5401be6e92a549888f4f5b1401993c093f08208bc6c4a21c2efdd44c12c81df

      SHA512

      28a71c5269795b55abe5560037aa6174725a72a50ebfca43aaa0a266d74ff3c83f1fc704d644ff0236d11ad7923a421a250ebccc86f459f038ca336cdb30f729

    • memory/208-0-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/208-1-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/208-3-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/208-2-0x000000000040F000-0x0000000000449000-memory.dmp

      Filesize

      232KB

    • memory/208-15-0x0000000010410000-0x0000000010449000-memory.dmp

      Filesize

      228KB

    • memory/208-16-0x0000000010410000-0x0000000010449000-memory.dmp

      Filesize

      228KB

    • memory/208-24-0x000000000040F000-0x0000000000449000-memory.dmp

      Filesize

      232KB

    • memory/208-23-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB