Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 05:18
Behavioral task
behavioral1
Sample
adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe
-
Size
739KB
-
MD5
adfce8d0f5416107a8acd10dde03c1fe
-
SHA1
3e1b9649c0e55f503ab5a30bb7b6240f62c848d5
-
SHA256
25862ad301f8b84c809256c04c3fa08eae435b77639a2d1e7a92cea143749a2e
-
SHA512
b3730b36cb46984f64740d29f464f6bb7fc15226df628bb702bc3eefb3a20d629bb247eb50151925851e867e64e85b8f39f951f0018615dd52da97c7d0f32ceb
-
SSDEEP
12288:RLfYODg2j5RQrFEsRLlF3/qynqj9aMeyZgK2IWATHgcK:xQNO5RQrC0vPxqjo/sMATHgv
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2464-1-0x0000000000060000-0x0000000000121000-memory.dmp modiloader_stage2 behavioral1/memory/2424-2-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2424 set thread context of 2464 2424 adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430292950" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92A11D61-5EB3-11EF-944F-F6257521C448} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 620 IEXPLORE.EXE 620 IEXPLORE.EXE 620 IEXPLORE.EXE 620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2464 2424 adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2464 2424 adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2464 2424 adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2464 2424 adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2464 2424 adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe 30 PID 2464 wrote to memory of 620 2464 IEXPLORE.EXE 31 PID 2464 wrote to memory of 620 2464 IEXPLORE.EXE 31 PID 2464 wrote to memory of 620 2464 IEXPLORE.EXE 31 PID 2464 wrote to memory of 620 2464 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5925b7a559161428d0c205b397bc4aadb
SHA1682a61670a22b9f5e59d92b664fa4cae742869c7
SHA25602a5aa5f54f4cc5c45df15ff01fe55724a08b41a0efb429107b0f42a68766e97
SHA512fde1350fc960d0ef0e9ee07dae86fc8ff0449125db7726439e6efe1c32c81363130b75448efc586bc31ee7e312ac5417ea08e3619970305806044320e891a1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fcabf4df596a017404caeace9956aa7
SHA1c18abaf2831c362b3858618adcac3888fac540ce
SHA256aea335bdc6c7415433997e3287b5d6df6b74eed3a4cd681f3cfe9cc4c813aaf8
SHA512053128fe2b138f1de85a90ab83d252b5be68a468b5589c58322b6d53e6a1acac7f08b6abcf8b9366efc9a6b5ed80b790010aae29579e077a6b94c681ca9b4145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501679b936ff37835bfc07f8b471e3e42
SHA1891d120ba69c8cf24f640337537219dc0a006973
SHA2565fb41b606b5c017aa32079b33d92c30445982ceeaa3d086346e8500129258019
SHA512ee5dab8af0f7044ab83113c2c10f9e908e69934764e1eff19e7e08eb58057ba87b6914030b74d14b3a2ac0261e5ece020cfb8880942971489b7eea24c208b12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3bc45b7e2b6fed49d7a04fda5bb549a
SHA111605ed1133fc3c8852b4971a160067fbac9d222
SHA256e85c77668f563fca9bb50e76b010d037e44593fdd2cbf9ccf09c3e31b6d04c77
SHA51267ccbe42b8e395ce9482ee2b98d9138c956051c996f0ee4444965bc8338fcd8396e46eed245156a08da038cf6600437d8dda7c3597271b6c21dcd46d87f34744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa09a26f590d91d4db9a15dcf7825e3d
SHA1756dab4a30d31f1d08fb70cce9e99d9a97d365ac
SHA2568c448fa63ba2703d32bfd330d695dac62763aae76260a4564f07c850915339ff
SHA5127581b64e16eb7d0934f0e0b6572c4995732eafbc01ae89cf8cf7ad6931aa5185be4c6e34a64f56e4de0cf98a5a8379d2ee14865773453b56ea1af87258cef634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528e59682bd7732fe8c32c77262dc9f1
SHA15580226539f133957c2779b2a370befcb800d195
SHA256e45ea4a57d4e583f965e10006d695e07f15e5c8629ae5ac8cd5d2d8c8bdbc65a
SHA512d0da0eb5c38a0ada4f8ae04498c4d452e1dd8562779e5a184b7d6a9628deddcffe9a81fc2b6b9504864006e185296b13098f378c3c6d0dc6a8c56abf9f47826f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e01bb8aa830ebd6770ebc95883be35
SHA10eefc2e4260da641d13b4c0969fcddd46b17aa07
SHA256414bfc071669956d5d48fdf0945727671174d38f0f2e7154c219178515b7a7ea
SHA512b61695a88732c943bc61428b9eb7caef4d6f3404332467187b513abb7128696162f6167cc2abdc5d9bc5a0d3337d3be88b7e54a242dd224c6e79435c0079d608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea3353db812eddb9b2f2b7933b32346
SHA1317d3d074156ad0d704b779bbb5f78557ef093e8
SHA2561806d5899487b4606e8726d0bbb13e8afa7f88f9c8e57ac9b5ca258b8db33cfa
SHA512b36e3cdce9d9b794f2117936cac94a2a6309b29fbf37838ddd4d50fecce88baab36267695f20cce6cdd19e80cf87b8168e70c5420d24cfddf49bf3d6da681c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd701a0a289171c6a28f379cc18cdf2
SHA1706ce17a89d326c6b315e6f719ff144b5ec57972
SHA25627a82ba092d2bc33d3ac6b4cd9725e4b1069fcd2d7db28ccc54aee7fe634abdf
SHA512b75a1cc907a106c3f8520e904820eb417a09253150fcb634f8569bf8cd293558932170581157bf7045831c0c43e49d6bbbd7906f726f817d868bdfa032d1ce29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8984ec5b77e659cdf7e50cf57fbce38
SHA1d8ccaf8fda2e9e5d4c3cad19d89f952fccde66d0
SHA2561bf793c2afec644012e2ff0536f1a47c33d50108388b8048bfc8d74fc4583b4e
SHA5124a2f573ddba8e3ddfc28e39f09b36cb93fbef166e9fc4dc6280805456fbe1233a9a1bc2d47de3675b71d33cfa93f6b879e28014172bad91cce212ca0037d9eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b47689d0d0f9e3cd8633cf38395d6f
SHA19d19e7658c064f62da3277a1dbbcb6d2cd3b90cf
SHA2562c20a1403b4887ecfe65979c98d67ee4467f344c292ec86f146c6a4f2eab6362
SHA512f86cea2e58161f90386ba142ca29685a29ad2008b8b25200f1e4b787010a676db7ffd583e26966c0a1434442347df06af9c6f228eceab287e1133669e99c78b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53acd6df9815219cdd47213fb286c7bce
SHA105f9ceb0bee29de6d475e6bbd01a339ac89ece02
SHA256db676e54ee7311121a51a27c826f45fe67c5efce4f4dcea1867b62be27cf1842
SHA512d749efe653ab36d013532c31446941aaf90c3281bf7b18808ffacfa89214e0463f2e0cedaec886b8807764583e44abfe999825c1cf44b06dd358ba8e39cb8adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e15cd22d3b93f859597d0e85f4a1f6c3
SHA1940e643847272577285975ba3b9754bbb1c2b8e8
SHA256a31102c8e146bf21a1de83f8d1045434bdb3113ff74d9f1935d8139ee5ea5eca
SHA51297521576b1aa47f00e54f685cb66785d50d3c78b292197fd343ddeb270f282fa197b7a48bec18ca596e62ac29bea611df080f556eb1764972d940f36ef929286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a74b0a4b7fd7ff4f53d4fbaa9507bf
SHA109266cebf05f26ef3271234e959fd8083f81e538
SHA256dbb9f4064235143d905174bd76401a1856b7cf82c82e431e5d8f83b65755fe8d
SHA512806da99b9b10849fe1e3cd030cea5bf3927a1e567039339347369d63188543455137fc4cceac4e89a95f3ed518864d43329f3234b44c627bf999c0360e75a329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5822e112b01d849f99416076c11df1207
SHA1b59e24ccaafcb9549c78a1dec6cf31f96609afea
SHA2567fbf97e0c53f35b22dbf254741694a366d6eab59470e53b92d7b4d3a9e69d3a7
SHA512f54332a4309b5fb642dad32608d072e4e3f808489ccce8cf8c3c3134b73c2bf5c8d76cb880ec55adeb7d4e7f40868c5606a5341a02a06fe95b37e08c84afa4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b7ae1e4f90e327efb0ce43a83bf471
SHA13062c5f6d2936329a3dccdae6001b5e52c9a017c
SHA256cf7b67344d7ea25a9c591d0bd84a4e83d3eccd32dc72dbabb87f1e22a9f005ef
SHA51255b257086ee14bb7a3ad84827312dd4ed59789c218ed3be137f522cb67e2fa519d905d2b2447dc65a340f275f51ede46c810bbdb7163da69bb18cf21f9165a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b14f7ed643a9d72bfd691d6d0c51bd9
SHA1201edde097e66de691b17da28b2e166dc464a693
SHA25602e69c38f522b8ab127313a1decaf162bce5b3a765df74c7c090ed9ff9c70eb7
SHA51296c09128a766e6ca9089b91e6d880cd1d3bb918c5c654a89866fda45a9dcf452db7570f79d4c53eb5f8eb5d83b8c5a0d4bd2d2ac61abf0a6e87e39a7e247445a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc34351733382533ce13f52091b2a2e
SHA1f1b2fcdc59ec9c02b9eb874e333e8acae277c733
SHA256f19509bd3cc0aa00ae164df9b083b03b9f577c217568b91ba965a7ca2422ae78
SHA5126b160d7b428c2794701d20528121cc465d0982c61b49d36c81155ad78dece2ad09eeeb9f49cf25f5e25b3e847a3bc39003eb807be3b08e8d3d85276f04630614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f56f65c544f74b3e7d63bd98f40beca
SHA13872b72e38ae3436d3ec5d7cf173c190f04ed2fe
SHA25602e2c65af8f83dd783afb37cd6ec22252f4d7d864011b80b84c4221438b1446c
SHA5127fbb1d3e30e8ba30efc5bd69444289a3a92680c35dc4dd2500c704197876eec30c05d49c9f8b472c255257fba9c1f393536888833ee4c26df3e75d546cd72688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea682b0276239e0f82593ad61d096ea2
SHA169327c9bb434a8624e6320cb4819a383ebb8a00f
SHA256b022fe32ee46d789a51554438c4327c5866eada4e4018269cec2cbe35d0d889a
SHA51217891effcd6534ec21363eba27508fed7aaa54c3d2493a1e4b37126dff150b32e22b061dd44f3390e634502c027d7391157854751c169531a5f786bcee9237de
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b