Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 13:01

General

  • Target

    e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe

  • Size

    710KB

  • MD5

    e03cbccf5be964de61f3ac65e841911f

  • SHA1

    201c06ff12d3494d57092c4b800421b59fcdb551

  • SHA256

    599dbac852823f4af45c3f05b1d3e94002b1ba34c092bcd0fd0ad7deb1dd1e99

  • SHA512

    f568e1c4465d71900482fe4b487c4f8ed9078e89656ebdbee9aa4c8aa6fafb4b8f99f476848d972235f751098bd3fa4e03cbc4fedd454b87dd6810c5dc24684d

  • SSDEEP

    12288:Gc//////Lze29cVYkNqKxNUi6D5M86qRPH4AL1lhsnjTO976QKnaN436gFmjgjj:Gc//////Lze8cVzEKxNl45M8PL1LT9hu

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2428
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1df86875b9c23907e8c492d0562ea48e

    SHA1

    fea34a0a5dcf773e234d6d8208a4c124f1b0bdb0

    SHA256

    f724219f9c5e60636af0a7bbf438a9db9398d08af392db5e6c7b536093e3e464

    SHA512

    d64092c535f0b55df8d63c5d813c7cf70561acf6c41c0ee1fbbbfaf4de82acbcf12cc15742266a9d9a691ba54bdfb12c27192f2ecfd6f2567ef879ddf287c295

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6513c799fbea43409e1f18c1703970bb

    SHA1

    95819ea3ae44b67f91996a7d32134f289db82019

    SHA256

    799646623fc4c247d66f13c3e15bfd1546b759e18642b71df707a89d01765693

    SHA512

    a21c2f14bb5391b83d17de6b78b7c24326d62b60c0f9b9263e6ce04ff0688c32e62345ada69676e95ccf8bdf5d24a803531bb036e45507c279be639d0fbc1124

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3e747c4a4ab75a88a40177cc77e36b2

    SHA1

    b88d437ce65e24325fd09926dd3409bd2375eed7

    SHA256

    136bb4f1321964400bed7b422a505b2e1b7b242022119df97ea84415e22a560b

    SHA512

    de004d661f30a54843ebd1f318fcb75135a0df3a872742ad1f90379501cc725fee7e4a4d12cee137dd326e169da8ce6dead50e62280bd8524ad497761377e183

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc123a44fe56e25c936003bf327577de

    SHA1

    fd89681e693fb46fb33bae36246252d3421621fa

    SHA256

    3c1496ea8126a3554460255a235de0803bd20586f89705352566423e66836493

    SHA512

    c3b4588f8a5fd28ee487d4453d5cb1cd111f406e8f39ee4b8b206b2c71d0d41df43b13ebd82f49e90d9f6518d68649b6be261822584637b0d70d448ab65d5bc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbb9fa483192fdfb536999fa5a5e046a

    SHA1

    291465d7de46b937afdefc96f403da0829482697

    SHA256

    bfc7be6a2f5bf08bfc5217f3a55b2d2bb0949929c71410bae62e57bd5ecd3164

    SHA512

    12689e89d334b8c590cf80cf71c628e2b48f3e3a649c62afe3f2735c044d62654db5833d7efa0ae47f04312452c12f5127def1e784ff809d85ed2dbb72292379

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7623f90bd32fccb5188672bda5d76f5b

    SHA1

    a218501d2e5bf6f8861192710112314366a2eca5

    SHA256

    f8198a00232d2de5a798ceb6a614dbaca8982374f655b5d597cc35771e2be85c

    SHA512

    b17418ac654432cb2d5eebda087afb798add593ac9a29e8699e1e1de49240736e85f638fda8c71751453cfc9d4e741e9330f78f62af610460b39f56dfdc237cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e776abdc9d9b105648633d94ecc99fb5

    SHA1

    cbec3bb78d59cfc8f57794ca8e358992b8e229ec

    SHA256

    237dc07279fe2dbf629f549b3b14c90f7575f238b15b87a95646afc9b34e6ea0

    SHA512

    2029c51d53219eb4fd6752bee968da301231372214164155ac309c5821f33897bdb7a02754d91a71f3a97f4a83589e6bea6952e3b22fc210a4c40aa846d6d9a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a02a58f84b411e5c7bb2a1198df4636f

    SHA1

    909f6c7b541eb90086a2fdd82a683d8a4b2d0038

    SHA256

    a2886025e2e0c3bec756bbd5fe7d96f23167f07dd852a4d45144e87e3b5cb9e9

    SHA512

    5e625094c889d3064800ff6e3b563602d2851a6b1d8c7bdc7cd0d6c55cf2f4ffe92e7ee856f765136ce513418f073d56a89e0c90f09b60538a2a21c4d3080369

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f0d766994c209be48efcb9d36ffe736

    SHA1

    9d44773eb5c536738da68a185a3233f85e3ef84a

    SHA256

    4e3348f754ed642b3516c8a46c3a5e481e46a2ec4d588cb53e3a8cb3ee1f686e

    SHA512

    84f7295a5d38e6da56d715de4d317b5b599a5d88a5d4a9c235da50860426e491f38a7b6889919c17667f011aa3342146eeb2780c104b1ba5c360a365510d06d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d21cc05e00f70d42cd9b2c9e7de8c1cd

    SHA1

    d38831de44099c7860a75362763669d30020ffe8

    SHA256

    bea05ee3d981a19c46b017d52b210c8a4fcecd30999818194a2a1636d0e8865b

    SHA512

    d489d221a526f208aaf93dd8d7e23be2376fe119ba88f268d6fd64d7f268d55e5e9c24e368b61f261a8932b979e6801721d65184ceac989fae803039ee136720

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6802371a95d3ce331dd41b86ee070f3

    SHA1

    2d239680b55e24ada4af420298f6965bf03d0903

    SHA256

    12f90ec646701d8ca07cbbc17130bf8dffc1f8ec11c137c8b22745922310d171

    SHA512

    6d9c751eb520c22a63577597354dc8d91278930ebffebdf8cb8b989586a81c790d5082e00bc7912538f1d3aa33c3c80377e6f86481533b3212ec0579148dfba2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc6266fb04016649e8090c086453d68c

    SHA1

    28d626570f2d25a1ee714a36f2e9369d8b6e809f

    SHA256

    460d51809f06116a9f5d996d1e0fc527b17498b82720b2f60c826808c05dae30

    SHA512

    58f779704f0ed226e6e055e3cc9c08931e2d473a23ccd8033e12ca81168408a8cc99c0df6d9be6249f2243a3696d595aadf1ec0719e9b05d5d82c8667a058f17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c540fea5b2ef03f1e350fbbfc9c5ee19

    SHA1

    c5739d2bd28136640ea39ad1322ad65e381e88ec

    SHA256

    59b92ac528b91635e124338c9d7eb9e31555d3e7a034aba00c38bbcb1086a2c6

    SHA512

    cdbf23cf96d533b1873f26c8484ea4bdc4636db50e55493caf599eb51e13bb6b00fcac32b4f2b2086716b4d687bde1ea6b5ddc8bf221785ff1cd14c2acae12c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50a9079a78b55e1008fcfa5d6fd2aaba

    SHA1

    28b99325bd7f3db255116c9e63e8ad85522669de

    SHA256

    6101df72504397954f250314cdfd51548490d1f189c995b90fe1e712d01133f3

    SHA512

    a420dbf2a08b68eb3600e6aefbc4e24f07182160eeb86e56ea1199037ff6e7ab918d00e63dd4277d98982e414b9616173182218791ef4c5a42bad245f7114edb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf79a3bcbab42a93e971b5ed3ada9524

    SHA1

    754e056cee831f7e7b81520701bf4a0a61812e20

    SHA256

    b9f5ec5d80313a99691c8aa9728654697d5d37e0427b68d6530cd6148139195c

    SHA512

    2b763b6803716568a0b0a200ac61b08192c9d662c97a6751bf181226ebf5f5ee25fe821796bdd2591d8bab7c381e10030c16d31747da73ab5810f1cb75c68b68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3602777898b3553b32327dcd7b0aaad8

    SHA1

    d27f13e3939c19547da3016a907aeea6fea95a7c

    SHA256

    7eab1cbde9e2c80d263d0e27781c3734d7333943389c8c8754a7ddba77cfd9d3

    SHA512

    c345700d42b2ee9164b9819bf9ddc40460df2999b92d8ff3ed861e705778bd0ee5dca377dcca908e318707f6478eaecada243eebb06d56ba46d7a5d6bb1d63e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53449b4805fea4148d935d002ae19d79

    SHA1

    b6457c32bf7d013fc1fdbb35a76c3625993e1b0b

    SHA256

    d32fce9da32682ccd24ff440f1be7cb3e154c740185d147a8c3f31ffdaacb885

    SHA512

    0f337af8a2b4d4abd44325870ae96200265fe989639dd9ad391ca24269eca8c2ad0d517151f8501aaa0f94e55af10cb9efd141cf4e4b278a77d33e33d8d5efef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9db1f5b60a6cafb3f197e6c065926b9

    SHA1

    dbddc05c4e1682ea1e80e98ab24a8cc08f8d8003

    SHA256

    d663833b343f8c75f25a2f0ee684ec41973e388534871b4ac18e400f58c2c2fa

    SHA512

    f43e55a6bcaa0776dadd3d66751dca9aecee8efc27b0d892a3170a4a35e1297fc55a5f537aa4d7b2f000f4b95d22d572caa814c1f58be57a1b641696a8c7f652

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6f55dcb10c88469e9758161bf9ca15a

    SHA1

    250f6cf63324cf739ee8aadda40b9c300c40dfca

    SHA256

    6a79e2667ad71075088e868618dc0e0e06b64c3cf0d598d5dd376bc6cb9463fc

    SHA512

    b2921ac65fad6551c84372828d01fbbdb26c869948150f0d79c2f5524812e66954ee921b755ca45966073e5c78be071076ccc8031660981c58439f9265bb6238

  • C:\Users\Admin\AppData\Local\Temp\Cab6C8C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6D2B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1852-5-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2428-13-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2428-4-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2428-2-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2428-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2428-7-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2428-8-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2428-9-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2428-16-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2428-12-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2968-11-0x0000000000160000-0x0000000000218000-memory.dmp

    Filesize

    736KB