Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 08:35

General

  • Target

    e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe

  • Size

    377KB

  • MD5

    e2171ccecc265df59e1239364ed05b23

  • SHA1

    36782a58e235be06b1e51e41440e3c506e6a72a8

  • SHA256

    d2eba427034e9192461bb2131ecf943f7f6c96ca8ca351261359c9a58170c291

  • SHA512

    fdd8515741fba04835d1d1122e8d50aba41ef0a333e496a7adee15986dad4b6c4e9284b9243e19a7303c3d7bf9ae1a40634784ba0ce22c6377d06aeac298ef5c

  • SSDEEP

    6144:Z7J7iI0ebkXG/kqZqYbN2HfeJa/PQ66noz8vvNhSbelLY9gCu0GRLApibpGj:veIApqIuAm4/IvFkbelMeacLg4kj

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    117a2bf1a86d29aace0bc9ccddc39394

    SHA1

    d17f7159a5688d17ab6fe0b28ae1c437cb158094

    SHA256

    fc23c3c441029f462b42d5a70bd2037300fee7f4f47839b07cf51dad2dc15a8e

    SHA512

    c6827c3f5470ef2a0aa2b343f999b606b9fc2f9ce1fdc753041b5710b6e87e5f99db52afb467dd0f87bada60464414e16903e161ddf3bb8961797041e24a8947

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a44d40a3d8bcde4ac80c2747e45d619

    SHA1

    076ecdf308168c3b2565c12c0615d1e46700507d

    SHA256

    942cd9cb79536c34e8dde27108af4234b88d3ff20ef3b9a9ebd38d04327b7886

    SHA512

    632cd99ed209fff6a582404e73cba944bc7e9d48bab7e5ea04b2e4b03b7d8e65bcc6f21e7bcb39167676705c97c863d552ef2ce007188af8b622c57c529f030c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f649721d4a89416da205337a6416dc6b

    SHA1

    c333b67bfcfe06ebf6e43b5a446586aed1561fee

    SHA256

    283d43ff89bf2de1e1197c5724dfbdcd9d2e1d954f1149d2fb7984247a4503b2

    SHA512

    006ed4e59f6191e4fc90bc08c22474c1564b4b8e9b81505f560b4a3fe7fb1404a821309b770f9e3457e60ab30cf152bfa79cdc48ca6c1f5c967306bebcf263d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db521caa5ca0f4897e3e888577077d57

    SHA1

    5c53cac0c56dd538794261826d8c9365820ec7e8

    SHA256

    dbb6d28f30e867851406594a84114a8b1767ef5e5e211c2590afd34c9df9fd9f

    SHA512

    ed008be0fdefe3f4aaf616982474fefb04f52055ed7f1ff36d18b69c134e2a74136203a2676f576a9c15e25aa71a45026e0b2c49b78fd7aedd5035889b2cc572

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26945cb83f825a3c92f05c4401c04b26

    SHA1

    c02c142be05f04b5c33b9e4d78357cba76541b2c

    SHA256

    afe387de653fa7fd2f343bd1ad2fefaddca7010da356f0715d8086d082931fff

    SHA512

    154f4426e4043eb84e9be720bcbe933a4f9d01f0682101c52d6177d93857655400292c151b3f8c70bc5f619c686d2f555477d2294f881ed89f21e2a6f3b61e0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8dfbb30e664ffe152236a53bdf2ea309

    SHA1

    344b6ffb1ebd5b6bb06733301f82ef1e9790eab1

    SHA256

    95f3e70aca60a38e3d832ce24b8889a3931c0fe929f494fece2939f6bbc51716

    SHA512

    1b125d0a728c2f53085c6a670aeb56c258592b8420207d42cb9f662a0397844daccd0bfd5d72268788948b052775e3cdfea5a18624a719bb949dc387caa52a2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4639dfc5368debb5b61c8ae5726e48b0

    SHA1

    928006b57986d692d355c58a73cfd2ead7f21dfe

    SHA256

    bd31b8bcf793864eb8eaf936e1be582635813ecb951798f82080870a20326a98

    SHA512

    69d5594140d2e5abaf6238d94ec88f04aecf53cbcbdc00bd1a3b9983447b1e7f2e1943ae82c745a9728a363926e8ed5eb04e770935c65216b4b6737846b845bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df1ae793d8467ddecc5f34cd76c50d40

    SHA1

    51c7b764f3c36db1acf021ba7658946471508ed7

    SHA256

    775e51a0583bcf4bd3dffcd53f124a1e5ef4c8a6998bd3c603825a7ce241bf23

    SHA512

    52b2a48279cfae5ef0a9747c00119b5f9b564b847e9fe7a06bf8d4ace127a501c20f15aefeb1c82c4a706e4d23718de6e7fca1182519fd5c2f3308c79ba7c714

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45b4bbf98b3e8d39ba65fd846ee4e87a

    SHA1

    463e161ad6ba60750c8aee5e67fc25d7fb7b3299

    SHA256

    e7e075e683130b51b6a15f7dfefe61d288be40200c7e2b58011776a9b5ff6ef4

    SHA512

    de1b722daa1ec127716636f6b985acc8ab82982212b5c146f4fcb83026a2480c3c39cfd2f7485d4b82a0f8e5cab7e2ae30c24e30c74b8935c64e3cfd0017cf39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd5ab96ad7f87964abee15a84f61ed0d

    SHA1

    3db10d9aeec84b3a9024f88a333be1a8715f4b2b

    SHA256

    86de5d118f43e9b59bf3327038019a84c73e17e578643f7f3b3b8d4ff18b0f26

    SHA512

    f722e85bdff1b6bcb8cec0759d39f3a598ee0f8bbf02e3c21c2fde3a50662c46cb9798c4dd3728a530ce4d79cd335ba2e4d848e274d84c3c8894156a1d039d77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92d5f4feee434c19d5893d863bc4f022

    SHA1

    f79887948c989ee31e2bb86d47d16e528bd197e7

    SHA256

    f8f1ae980eea72df489de6775070479ec72aa771de2580e7e496a081169ba30d

    SHA512

    bfd384c03e561d13c8dda3dcf0dc2480c47f9760cae46b9b31ef7a47bf37a98610bd4712a5757c08047d8aa19210a298a3c3440cada57df015dde2942cb02098

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b095b4cd2aeceaddb38089dd2e94846a

    SHA1

    93784ed9292ee7cf973885b113d1d743929a3cd8

    SHA256

    f6498bb2e5b0b536820a2b8c6f0e6380160003ea21117de5631c4d7651bf5a3d

    SHA512

    b1dc01e57f4cbe5a02fb212e3235a96c55a7ad4d44bde09d6382d8d4ae3ab00311d8d596f8915bcef73711811fe390f6c474d6a47bffcb718c1659d0c82ffe22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f5421538e4041cd6e0689bfbefedf11

    SHA1

    5291a7c6e5efe1f5a3987423e2f62a1fd20637d6

    SHA256

    8075d5643a1b45b7248f17e2213446c3434ecd665aca140e9ecf1ec7192c0402

    SHA512

    27eb3d1b8dbd4b80669c752b1c7e7578a41578d9dfb5272547238711fe9cc4ae00f10f9adcb812f813b0d7352825b0c79ba792874fdb6b3779180ae73ba899e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b2e6c10c42df7b6ab6ab87f20afb927

    SHA1

    9c642226c07b25fc111df2c8abe5b77c966562c4

    SHA256

    fc21819d5ea7ea3822c77292c1bc4beb88c237025a12f80c890a83aa98166cdd

    SHA512

    a0abaa736dfd84f00afc9e8fac420b80139385ebf9c4a418bd59ff50f58a5e0a4139b85c77543f19b0c9ed49b83efcf573e3109fed671960b8bbd72d6971d02c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    093912fd1694eb5cbec945381fd074b3

    SHA1

    35ee68bd96ed213ff60bd4e814c6069fa5d0b70b

    SHA256

    9a1c90ef55431ad818339ff3fc67205dc01f3ba8af3329d52d96304e77a77177

    SHA512

    fcc373b0a1428a6abcbb96eb08d53c69281ce7b29874067521136d6089f478414883bedfed9c41d525496e227be119f9e6a35684caf6217da75dfad35a5ea846

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6987006a9b9d73c7477a33fb7d78cc85

    SHA1

    b00ada75017d19a3c6ad01bfd47ac0f1a9bab7e0

    SHA256

    00c37bca61c9aff1e573612d342e1ac6b5d8b19e03831fc17a8bf0963e42d1b1

    SHA512

    e05e121a60b69a29260a67a04d9a59d08ef4852adcb13baaaff78a9ccdba27e50fd90afceec35a71c0e315efea651e7e3bc075a95bed0caf3ee306ea7375e197

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5466fc0a9547d77dd002e8fa53b3c0e5

    SHA1

    236f7f96f797d0bfcec2031b554e2c9829fc68f9

    SHA256

    61c5e6da6778747e7de976a75b8789cc841036b44374d5ebc75df95e6fe455ca

    SHA512

    44cb969bcb0cb966e47584ec89d80d2ef38b4e64f199f0e53bfa7b94955abebbc8c9a5fd32de3ddad2e0a1d6cb84d85e4f0a329e150c59e54bd414fe38ce3499

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54daf7c069fdc7897192f430530abff2

    SHA1

    0bff2e2d0d453f60c9d9b3200c96d2222c99e6a4

    SHA256

    efcfc4be01bed2f7f475e87cafb8f9729912112d8fd8b2889225ef096b109d10

    SHA512

    870a51e12c6da7e00d809873d549b29e5bc801378deed49ccfdd470c8dc41310815fce475408b5027cbe07a532c3cbe1b157e3637f062e759afde22511f22169

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63dd123627d2c1ba27e159a7ccaeb174

    SHA1

    dcc8d3796388ab7f266691b13020f9f435554608

    SHA256

    67bc83fa8ee92593baafc167bb956bab25c7e7761f81de96116d46221fa0f461

    SHA512

    63df758131f63ff0493af752faac7ff7b6831d8a732e57387b79075a37c5936ffd2c3568a49e58e8f77f82fe09ff604a155862c2d98a6a3e7457ecdb53d1e8fa

  • C:\Users\Admin\AppData\Local\Temp\Cab1558.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar15F7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2868-3-0x0000000000160000-0x000000000027A000-memory.dmp

    Filesize

    1.1MB

  • memory/2968-4-0x0000000000416000-0x0000000000417000-memory.dmp

    Filesize

    4KB

  • memory/2968-0-0x0000000000400000-0x0000000000519030-memory.dmp

    Filesize

    1.1MB

  • memory/2968-1-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2968-5-0x0000000000400000-0x0000000000519030-memory.dmp

    Filesize

    1.1MB