Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 05:18

General

  • Target

    adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe

  • Size

    739KB

  • MD5

    adfce8d0f5416107a8acd10dde03c1fe

  • SHA1

    3e1b9649c0e55f503ab5a30bb7b6240f62c848d5

  • SHA256

    25862ad301f8b84c809256c04c3fa08eae435b77639a2d1e7a92cea143749a2e

  • SHA512

    b3730b36cb46984f64740d29f464f6bb7fc15226df628bb702bc3eefb3a20d629bb247eb50151925851e867e64e85b8f39f951f0018615dd52da97c7d0f32ceb

  • SSDEEP

    12288:RLfYODg2j5RQrFEsRLlF3/qynqj9aMeyZgK2IWATHgcK:xQNO5RQrC0vPxqjo/sMATHgv

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\adfce8d0f5416107a8acd10dde03c1fe_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    925b7a559161428d0c205b397bc4aadb

    SHA1

    682a61670a22b9f5e59d92b664fa4cae742869c7

    SHA256

    02a5aa5f54f4cc5c45df15ff01fe55724a08b41a0efb429107b0f42a68766e97

    SHA512

    fde1350fc960d0ef0e9ee07dae86fc8ff0449125db7726439e6efe1c32c81363130b75448efc586bc31ee7e312ac5417ea08e3619970305806044320e891a1c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fcabf4df596a017404caeace9956aa7

    SHA1

    c18abaf2831c362b3858618adcac3888fac540ce

    SHA256

    aea335bdc6c7415433997e3287b5d6df6b74eed3a4cd681f3cfe9cc4c813aaf8

    SHA512

    053128fe2b138f1de85a90ab83d252b5be68a468b5589c58322b6d53e6a1acac7f08b6abcf8b9366efc9a6b5ed80b790010aae29579e077a6b94c681ca9b4145

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01679b936ff37835bfc07f8b471e3e42

    SHA1

    891d120ba69c8cf24f640337537219dc0a006973

    SHA256

    5fb41b606b5c017aa32079b33d92c30445982ceeaa3d086346e8500129258019

    SHA512

    ee5dab8af0f7044ab83113c2c10f9e908e69934764e1eff19e7e08eb58057ba87b6914030b74d14b3a2ac0261e5ece020cfb8880942971489b7eea24c208b12f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3bc45b7e2b6fed49d7a04fda5bb549a

    SHA1

    11605ed1133fc3c8852b4971a160067fbac9d222

    SHA256

    e85c77668f563fca9bb50e76b010d037e44593fdd2cbf9ccf09c3e31b6d04c77

    SHA512

    67ccbe42b8e395ce9482ee2b98d9138c956051c996f0ee4444965bc8338fcd8396e46eed245156a08da038cf6600437d8dda7c3597271b6c21dcd46d87f34744

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa09a26f590d91d4db9a15dcf7825e3d

    SHA1

    756dab4a30d31f1d08fb70cce9e99d9a97d365ac

    SHA256

    8c448fa63ba2703d32bfd330d695dac62763aae76260a4564f07c850915339ff

    SHA512

    7581b64e16eb7d0934f0e0b6572c4995732eafbc01ae89cf8cf7ad6931aa5185be4c6e34a64f56e4de0cf98a5a8379d2ee14865773453b56ea1af87258cef634

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    528e59682bd7732fe8c32c77262dc9f1

    SHA1

    5580226539f133957c2779b2a370befcb800d195

    SHA256

    e45ea4a57d4e583f965e10006d695e07f15e5c8629ae5ac8cd5d2d8c8bdbc65a

    SHA512

    d0da0eb5c38a0ada4f8ae04498c4d452e1dd8562779e5a184b7d6a9628deddcffe9a81fc2b6b9504864006e185296b13098f378c3c6d0dc6a8c56abf9f47826f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0e01bb8aa830ebd6770ebc95883be35

    SHA1

    0eefc2e4260da641d13b4c0969fcddd46b17aa07

    SHA256

    414bfc071669956d5d48fdf0945727671174d38f0f2e7154c219178515b7a7ea

    SHA512

    b61695a88732c943bc61428b9eb7caef4d6f3404332467187b513abb7128696162f6167cc2abdc5d9bc5a0d3337d3be88b7e54a242dd224c6e79435c0079d608

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aea3353db812eddb9b2f2b7933b32346

    SHA1

    317d3d074156ad0d704b779bbb5f78557ef093e8

    SHA256

    1806d5899487b4606e8726d0bbb13e8afa7f88f9c8e57ac9b5ca258b8db33cfa

    SHA512

    b36e3cdce9d9b794f2117936cac94a2a6309b29fbf37838ddd4d50fecce88baab36267695f20cce6cdd19e80cf87b8168e70c5420d24cfddf49bf3d6da681c7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4dd701a0a289171c6a28f379cc18cdf2

    SHA1

    706ce17a89d326c6b315e6f719ff144b5ec57972

    SHA256

    27a82ba092d2bc33d3ac6b4cd9725e4b1069fcd2d7db28ccc54aee7fe634abdf

    SHA512

    b75a1cc907a106c3f8520e904820eb417a09253150fcb634f8569bf8cd293558932170581157bf7045831c0c43e49d6bbbd7906f726f817d868bdfa032d1ce29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8984ec5b77e659cdf7e50cf57fbce38

    SHA1

    d8ccaf8fda2e9e5d4c3cad19d89f952fccde66d0

    SHA256

    1bf793c2afec644012e2ff0536f1a47c33d50108388b8048bfc8d74fc4583b4e

    SHA512

    4a2f573ddba8e3ddfc28e39f09b36cb93fbef166e9fc4dc6280805456fbe1233a9a1bc2d47de3675b71d33cfa93f6b879e28014172bad91cce212ca0037d9eba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32b47689d0d0f9e3cd8633cf38395d6f

    SHA1

    9d19e7658c064f62da3277a1dbbcb6d2cd3b90cf

    SHA256

    2c20a1403b4887ecfe65979c98d67ee4467f344c292ec86f146c6a4f2eab6362

    SHA512

    f86cea2e58161f90386ba142ca29685a29ad2008b8b25200f1e4b787010a676db7ffd583e26966c0a1434442347df06af9c6f228eceab287e1133669e99c78b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3acd6df9815219cdd47213fb286c7bce

    SHA1

    05f9ceb0bee29de6d475e6bbd01a339ac89ece02

    SHA256

    db676e54ee7311121a51a27c826f45fe67c5efce4f4dcea1867b62be27cf1842

    SHA512

    d749efe653ab36d013532c31446941aaf90c3281bf7b18808ffacfa89214e0463f2e0cedaec886b8807764583e44abfe999825c1cf44b06dd358ba8e39cb8adb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e15cd22d3b93f859597d0e85f4a1f6c3

    SHA1

    940e643847272577285975ba3b9754bbb1c2b8e8

    SHA256

    a31102c8e146bf21a1de83f8d1045434bdb3113ff74d9f1935d8139ee5ea5eca

    SHA512

    97521576b1aa47f00e54f685cb66785d50d3c78b292197fd343ddeb270f282fa197b7a48bec18ca596e62ac29bea611df080f556eb1764972d940f36ef929286

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7a74b0a4b7fd7ff4f53d4fbaa9507bf

    SHA1

    09266cebf05f26ef3271234e959fd8083f81e538

    SHA256

    dbb9f4064235143d905174bd76401a1856b7cf82c82e431e5d8f83b65755fe8d

    SHA512

    806da99b9b10849fe1e3cd030cea5bf3927a1e567039339347369d63188543455137fc4cceac4e89a95f3ed518864d43329f3234b44c627bf999c0360e75a329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    822e112b01d849f99416076c11df1207

    SHA1

    b59e24ccaafcb9549c78a1dec6cf31f96609afea

    SHA256

    7fbf97e0c53f35b22dbf254741694a366d6eab59470e53b92d7b4d3a9e69d3a7

    SHA512

    f54332a4309b5fb642dad32608d072e4e3f808489ccce8cf8c3c3134b73c2bf5c8d76cb880ec55adeb7d4e7f40868c5606a5341a02a06fe95b37e08c84afa4fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10b7ae1e4f90e327efb0ce43a83bf471

    SHA1

    3062c5f6d2936329a3dccdae6001b5e52c9a017c

    SHA256

    cf7b67344d7ea25a9c591d0bd84a4e83d3eccd32dc72dbabb87f1e22a9f005ef

    SHA512

    55b257086ee14bb7a3ad84827312dd4ed59789c218ed3be137f522cb67e2fa519d905d2b2447dc65a340f275f51ede46c810bbdb7163da69bb18cf21f9165a14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b14f7ed643a9d72bfd691d6d0c51bd9

    SHA1

    201edde097e66de691b17da28b2e166dc464a693

    SHA256

    02e69c38f522b8ab127313a1decaf162bce5b3a765df74c7c090ed9ff9c70eb7

    SHA512

    96c09128a766e6ca9089b91e6d880cd1d3bb918c5c654a89866fda45a9dcf452db7570f79d4c53eb5f8eb5d83b8c5a0d4bd2d2ac61abf0a6e87e39a7e247445a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbc34351733382533ce13f52091b2a2e

    SHA1

    f1b2fcdc59ec9c02b9eb874e333e8acae277c733

    SHA256

    f19509bd3cc0aa00ae164df9b083b03b9f577c217568b91ba965a7ca2422ae78

    SHA512

    6b160d7b428c2794701d20528121cc465d0982c61b49d36c81155ad78dece2ad09eeeb9f49cf25f5e25b3e847a3bc39003eb807be3b08e8d3d85276f04630614

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f56f65c544f74b3e7d63bd98f40beca

    SHA1

    3872b72e38ae3436d3ec5d7cf173c190f04ed2fe

    SHA256

    02e2c65af8f83dd783afb37cd6ec22252f4d7d864011b80b84c4221438b1446c

    SHA512

    7fbb1d3e30e8ba30efc5bd69444289a3a92680c35dc4dd2500c704197876eec30c05d49c9f8b472c255257fba9c1f393536888833ee4c26df3e75d546cd72688

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea682b0276239e0f82593ad61d096ea2

    SHA1

    69327c9bb434a8624e6320cb4819a383ebb8a00f

    SHA256

    b022fe32ee46d789a51554438c4327c5866eada4e4018269cec2cbe35d0d889a

    SHA512

    17891effcd6534ec21363eba27508fed7aaa54c3d2493a1e4b37126dff150b32e22b061dd44f3390e634502c027d7391157854751c169531a5f786bcee9237de

  • C:\Users\Admin\AppData\Local\Temp\Cab845E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar84CF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2424-2-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2464-1-0x0000000000060000-0x0000000000121000-memory.dmp

    Filesize

    772KB