Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 00:31
Behavioral task
behavioral1
Sample
df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe
-
Size
89KB
-
MD5
df2b46519d33bdb827c5cad1953f4205
-
SHA1
c28e2ad43ef220d271aa3704729c26f44066e6c8
-
SHA256
6ecac628b6fae0ea6a585b5b3c14147c4e604b4b12b2963311bdb20ed016e5b6
-
SHA512
c7859155e64523154dfabbe954ed83638122e922df055692b5707bcde3c42a0405737e679f88c92457fe153544e940aa4282ba9f5f7035cc1462f58291fcca40
-
SSDEEP
1536:ncHA5dZuvrKA1r4Jwwi55dlvo89UBYKpJ0pHWG7m9pAsiyR9NqtgUU74w8U:ncg7UrKqUwflAZYKX6aAsiydELA4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 16 IoCs
resource yara_rule behavioral2/memory/3708-10-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-12-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-13-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-14-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-15-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-16-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-17-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-18-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-19-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-20-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-21-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-22-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-23-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-24-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-25-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1756-26-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1756 msmgrs.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntdll.lnk msmgrs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntdll.lnk msmgrs.exe -
Executes dropped EXE 1 IoCs
pid Process 1756 msmgrs.exe -
resource yara_rule behavioral2/memory/3708-0-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/files/0x00090000000234c7-5.dat upx behavioral2/memory/3708-10-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-12-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-13-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-14-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-15-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-16-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-17-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-18-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-19-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-20-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-21-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-22-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-23-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-24-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-25-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1756-26-0x0000000000400000-0x000000000043C000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wins\setup\msmgrs.exe df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wins\setup\msmgrs.exe df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msmgrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3708 df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe 3708 df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe 1756 msmgrs.exe 1756 msmgrs.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3708 wrote to memory of 1756 3708 df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe 86 PID 3708 wrote to memory of 1756 3708 df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe 86 PID 3708 wrote to memory of 1756 3708 df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe 86 PID 1756 wrote to memory of 1352 1756 msmgrs.exe 87 PID 1756 wrote to memory of 1352 1756 msmgrs.exe 87 PID 1756 wrote to memory of 1352 1756 msmgrs.exe 87 PID 1756 wrote to memory of 1672 1756 msmgrs.exe 88 PID 1756 wrote to memory of 1672 1756 msmgrs.exe 88 PID 1756 wrote to memory of 1672 1756 msmgrs.exe 88 PID 1352 wrote to memory of 3516 1352 cmd.exe 91 PID 1352 wrote to memory of 3516 1352 cmd.exe 91 PID 1352 wrote to memory of 3516 1352 cmd.exe 91 PID 1672 wrote to memory of 5032 1672 cmd.exe 92 PID 1672 wrote to memory of 5032 1672 cmd.exe 92 PID 1672 wrote to memory of 5032 1672 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df2b46519d33bdb827c5cad1953f4205_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\wins\setup\msmgrs.exe"C:\Windows\system32\wins\setup\msmgrs.exe"2⤵
- Deletes itself
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/JaguarEditControl.dll3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/JaguarEditControl.dll4⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/tebedit.ocx3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/tebedit.ocx4⤵
- System Location Discovery: System Language Discovery
PID:5032
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5df2b46519d33bdb827c5cad1953f4205
SHA1c28e2ad43ef220d271aa3704729c26f44066e6c8
SHA2566ecac628b6fae0ea6a585b5b3c14147c4e604b4b12b2963311bdb20ed016e5b6
SHA512c7859155e64523154dfabbe954ed83638122e922df055692b5707bcde3c42a0405737e679f88c92457fe153544e940aa4282ba9f5f7035cc1462f58291fcca40