Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe
-
Size
271KB
-
MD5
e06c69c49584c658bc6d763b23be5a96
-
SHA1
c9f23e2ae268bcefbf346d37dc1a03c3df1ede90
-
SHA256
4e58ce8d327985f314bdfd54db5c55068adc4dfcc3f326d09994c96ee9a40fbe
-
SHA512
ef278781d3eb6eb34382d968cad6452ec3a71f6a618aa4134fbb01837ccb4ea5c7a713e14fddc465b2f4129c9b987333a2f1e79ae5e4d69083e3e59d6eb6dca1
-
SSDEEP
6144:un04iaqbh4l26Px8c/mcbwBDzQiI9QKDQ38IFnAmvHQN8F7L+:Z4iaqal2wqhI9J8MIFnAmoN8Q
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/memory/1312-1-0x0000000000400000-0x0000000000504000-memory.dmp modiloader_stage2 behavioral1/memory/2376-31-0x0000000000400000-0x0000000000504000-memory.dmp modiloader_stage2 behavioral1/memory/1312-42-0x0000000000400000-0x0000000000504000-memory.dmp modiloader_stage2 behavioral1/memory/2376-44-0x0000000000400000-0x0000000000504000-memory.dmp modiloader_stage2 behavioral1/memory/1312-53-0x0000000000400000-0x0000000000504000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2632 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2376 IEXPL0RE.EXE -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\I: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\K: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\L: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\O: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\S: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\T: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\V: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\X: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\J: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\M: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\Q: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\B: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\E: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\G: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\N: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\Y: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\Z: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\A: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\H: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\P: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\R: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened (read-only) \??\U: e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AutoRun.inf e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened for modification F:\AutoRun.inf e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_IEXPL0RE.EXE IEXPL0RE.EXE File opened for modification C:\Windows\SysWOW64\_IEXPL0RE.EXE IEXPL0RE.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2376 set thread context of 2440 2376 IEXPL0RE.EXE 31 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\IEXPL0RE.EXE e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File opened for modification C:\Windows\IEXPL0RE.EXE e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe File created C:\Windows\ReDelBat.bat e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1844 2376 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPL0RE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1312 wrote to memory of 2376 1312 e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe 30 PID 1312 wrote to memory of 2376 1312 e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe 30 PID 1312 wrote to memory of 2376 1312 e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe 30 PID 1312 wrote to memory of 2376 1312 e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2440 2376 IEXPL0RE.EXE 31 PID 2376 wrote to memory of 2440 2376 IEXPL0RE.EXE 31 PID 2376 wrote to memory of 2440 2376 IEXPL0RE.EXE 31 PID 2376 wrote to memory of 2440 2376 IEXPL0RE.EXE 31 PID 2376 wrote to memory of 2440 2376 IEXPL0RE.EXE 31 PID 2376 wrote to memory of 2440 2376 IEXPL0RE.EXE 31 PID 2376 wrote to memory of 1844 2376 IEXPL0RE.EXE 32 PID 2376 wrote to memory of 1844 2376 IEXPL0RE.EXE 32 PID 2376 wrote to memory of 1844 2376 IEXPL0RE.EXE 32 PID 2376 wrote to memory of 1844 2376 IEXPL0RE.EXE 32 PID 1312 wrote to memory of 2632 1312 e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe 34 PID 1312 wrote to memory of 2632 1312 e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe 34 PID 1312 wrote to memory of 2632 1312 e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe 34 PID 1312 wrote to memory of 2632 1312 e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e06c69c49584c658bc6d763b23be5a96_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\IEXPL0RE.EXEC:\Windows\IEXPL0RE.EXE2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe"3⤵PID:2440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 2803⤵
- Program crash
PID:1844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ReDelBat.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172B
MD5ce0c8ce88cb3df958100773386d9a1ed
SHA1055c6253e4f63f18812bf9820b43fdbf8751f327
SHA2561f1349065382cd56502f9ef82162ce578464c0146531c1788a64cbc5858bc4ac
SHA5128a6b3d397c4ca06963859849e8650320fedf7cfdf57646b2ced10da97ead18416691439efb606502533311ec024a7c38bcfca15cf9068adee44f617bc7858ce6
-
Filesize
212B
MD55391194c8a253177b24afe6df00dc66f
SHA1ef2a1010861acc76f7da615f8fa9e82310e50785
SHA256f71d5d1f2da4352415d1184fa066c5d361b3b6591c2c0a5b94a93b1b65a9f77d
SHA5124953606d7573c984a3c65cd024a3392c4c40226ff815f0d7d266b30d10ed86b3cc44d131e4c9da4edfc39c8da0269abdbf4111a13c077c7a3c64affe2dede531
-
Filesize
271KB
MD5e06c69c49584c658bc6d763b23be5a96
SHA1c9f23e2ae268bcefbf346d37dc1a03c3df1ede90
SHA2564e58ce8d327985f314bdfd54db5c55068adc4dfcc3f326d09994c96ee9a40fbe
SHA512ef278781d3eb6eb34382d968cad6452ec3a71f6a618aa4134fbb01837ccb4ea5c7a713e14fddc465b2f4129c9b987333a2f1e79ae5e4d69083e3e59d6eb6dca1