Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 05:18 UTC

General

  • Target

    a9bd5add6be1e16bb6e2345c63027767_JaffaCakes118.exe

  • Size

    629KB

  • MD5

    a9bd5add6be1e16bb6e2345c63027767

  • SHA1

    cb381752e3381289fa51c54a52962a0675e6c5ea

  • SHA256

    d70c44503c2b35efc6ae5c05b113f02929711e1eeb0b965d554dc8d5692ccec6

  • SHA512

    edaffe0d63b9b0afcbbc6d86622a0de32998087bbf248537e232feb2b71a4657e1b8a151c79a9f6724923ed813f3a20ba601c315c2710fb4b18678dac974d54a

  • SSDEEP

    12288:tUNe0Jcr6gl5XW0s9QQoZ1jKBE1ptF3Z4mxxgoEtlK+kt9T2MIukPtd+:tvKcrH5E9QQoZYBEztQmX5GN5P6

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9bd5add6be1e16bb6e2345c63027767_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a9bd5add6be1e16bb6e2345c63027767_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\svchost.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 268
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2656
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\DelSvel.bat""
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\DelSvel.bat

    Filesize

    212B

    MD5

    2f25e1d31bfdfbb80d59da217252076d

    SHA1

    d0063bb23a4cf708652ba287ef8b871c216ade60

    SHA256

    779ca022d8249115fe23fa2b307391a59d24d30fd6be57a000baadfb22e89aec

    SHA512

    60fab0f8fa9ffd3e60ab27def550fa5224b4781e4598969df8b311bfd7a878b2f15f6734fe3b7fa90053075cbdc2c7074d9839d49c53cc2de0b3afefbdb5e32f

  • F:\svchost.exe

    Filesize

    629KB

    MD5

    a9bd5add6be1e16bb6e2345c63027767

    SHA1

    cb381752e3381289fa51c54a52962a0675e6c5ea

    SHA256

    d70c44503c2b35efc6ae5c05b113f02929711e1eeb0b965d554dc8d5692ccec6

    SHA512

    edaffe0d63b9b0afcbbc6d86622a0de32998087bbf248537e232feb2b71a4657e1b8a151c79a9f6724923ed813f3a20ba601c315c2710fb4b18678dac974d54a

  • memory/1152-45-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/1152-60-0x0000000001ED0000-0x0000000001F24000-memory.dmp

    Filesize

    336KB

  • memory/1152-59-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/1152-46-0x0000000001ED0000-0x0000000001F24000-memory.dmp

    Filesize

    336KB

  • memory/2312-18-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2312-2-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/2312-20-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/2312-19-0x00000000033C0000-0x00000000033C1000-memory.dmp

    Filesize

    4KB

  • memory/2312-0-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/2312-17-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2312-15-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-14-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-13-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-12-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-11-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-10-0x0000000001E90000-0x0000000001E91000-memory.dmp

    Filesize

    4KB

  • memory/2312-9-0x0000000002120000-0x0000000002121000-memory.dmp

    Filesize

    4KB

  • memory/2312-8-0x00000000020F0000-0x00000000020F1000-memory.dmp

    Filesize

    4KB

  • memory/2312-7-0x0000000002100000-0x0000000002101000-memory.dmp

    Filesize

    4KB

  • memory/2312-6-0x0000000001E70000-0x0000000001E71000-memory.dmp

    Filesize

    4KB

  • memory/2312-5-0x0000000001E80000-0x0000000001E81000-memory.dmp

    Filesize

    4KB

  • memory/2312-4-0x0000000002110000-0x0000000002111000-memory.dmp

    Filesize

    4KB

  • memory/2312-3-0x0000000001EA0000-0x0000000001EA1000-memory.dmp

    Filesize

    4KB

  • memory/2312-21-0x00000000033A0000-0x00000000033A1000-memory.dmp

    Filesize

    4KB

  • memory/2312-22-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-44-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/2312-42-0x00000000045F0000-0x0000000004705000-memory.dmp

    Filesize

    1.1MB

  • memory/2312-41-0x00000000045F0000-0x0000000004705000-memory.dmp

    Filesize

    1.1MB

  • memory/2312-23-0x0000000003410000-0x0000000003411000-memory.dmp

    Filesize

    4KB

  • memory/2312-47-0x0000000001DD0000-0x0000000001E24000-memory.dmp

    Filesize

    336KB

  • memory/2312-48-0x0000000003480000-0x0000000003481000-memory.dmp

    Filesize

    4KB

  • memory/2312-50-0x0000000003380000-0x0000000003381000-memory.dmp

    Filesize

    4KB

  • memory/2312-57-0x0000000001E60000-0x0000000001E61000-memory.dmp

    Filesize

    4KB

  • memory/2312-58-0x00000000045F0000-0x0000000004705000-memory.dmp

    Filesize

    1.1MB

  • memory/2312-24-0x0000000001E60000-0x0000000001E61000-memory.dmp

    Filesize

    4KB

  • memory/2312-16-0x0000000003380000-0x0000000003383000-memory.dmp

    Filesize

    12KB

  • memory/2312-1-0x0000000001DD0000-0x0000000001E24000-memory.dmp

    Filesize

    336KB

  • memory/2312-75-0x00000000033F0000-0x00000000033F1000-memory.dmp

    Filesize

    4KB

  • memory/2312-74-0x0000000003400000-0x0000000003401000-memory.dmp

    Filesize

    4KB

  • memory/2312-77-0x0000000001DD0000-0x0000000001E24000-memory.dmp

    Filesize

    336KB

  • memory/2312-78-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.