Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe
-
Size
377KB
-
MD5
e2171ccecc265df59e1239364ed05b23
-
SHA1
36782a58e235be06b1e51e41440e3c506e6a72a8
-
SHA256
d2eba427034e9192461bb2131ecf943f7f6c96ca8ca351261359c9a58170c291
-
SHA512
fdd8515741fba04835d1d1122e8d50aba41ef0a333e496a7adee15986dad4b6c4e9284b9243e19a7303c3d7bf9ae1a40634784ba0ce22c6377d06aeac298ef5c
-
SSDEEP
6144:Z7J7iI0ebkXG/kqZqYbN2HfeJa/PQ66noz8vvNhSbelLY9gCu0GRLApibpGj:veIApqIuAm4/IvFkbelMeacLg4kj
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2968-5-0x0000000000400000-0x0000000000519030-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2968 set thread context of 2868 2968 e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432551227" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{889E1721-733D-11EF-94A5-465533733A50} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2868 2968 e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2868 2968 e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2868 2968 e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2868 2968 e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2868 2968 e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe 30 PID 2868 wrote to memory of 2824 2868 IEXPLORE.EXE 31 PID 2868 wrote to memory of 2824 2868 IEXPLORE.EXE 31 PID 2868 wrote to memory of 2824 2868 IEXPLORE.EXE 31 PID 2868 wrote to memory of 2824 2868 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2171ccecc265df59e1239364ed05b23_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5117a2bf1a86d29aace0bc9ccddc39394
SHA1d17f7159a5688d17ab6fe0b28ae1c437cb158094
SHA256fc23c3c441029f462b42d5a70bd2037300fee7f4f47839b07cf51dad2dc15a8e
SHA512c6827c3f5470ef2a0aa2b343f999b606b9fc2f9ce1fdc753041b5710b6e87e5f99db52afb467dd0f87bada60464414e16903e161ddf3bb8961797041e24a8947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a44d40a3d8bcde4ac80c2747e45d619
SHA1076ecdf308168c3b2565c12c0615d1e46700507d
SHA256942cd9cb79536c34e8dde27108af4234b88d3ff20ef3b9a9ebd38d04327b7886
SHA512632cd99ed209fff6a582404e73cba944bc7e9d48bab7e5ea04b2e4b03b7d8e65bcc6f21e7bcb39167676705c97c863d552ef2ce007188af8b622c57c529f030c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f649721d4a89416da205337a6416dc6b
SHA1c333b67bfcfe06ebf6e43b5a446586aed1561fee
SHA256283d43ff89bf2de1e1197c5724dfbdcd9d2e1d954f1149d2fb7984247a4503b2
SHA512006ed4e59f6191e4fc90bc08c22474c1564b4b8e9b81505f560b4a3fe7fb1404a821309b770f9e3457e60ab30cf152bfa79cdc48ca6c1f5c967306bebcf263d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db521caa5ca0f4897e3e888577077d57
SHA15c53cac0c56dd538794261826d8c9365820ec7e8
SHA256dbb6d28f30e867851406594a84114a8b1767ef5e5e211c2590afd34c9df9fd9f
SHA512ed008be0fdefe3f4aaf616982474fefb04f52055ed7f1ff36d18b69c134e2a74136203a2676f576a9c15e25aa71a45026e0b2c49b78fd7aedd5035889b2cc572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526945cb83f825a3c92f05c4401c04b26
SHA1c02c142be05f04b5c33b9e4d78357cba76541b2c
SHA256afe387de653fa7fd2f343bd1ad2fefaddca7010da356f0715d8086d082931fff
SHA512154f4426e4043eb84e9be720bcbe933a4f9d01f0682101c52d6177d93857655400292c151b3f8c70bc5f619c686d2f555477d2294f881ed89f21e2a6f3b61e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dfbb30e664ffe152236a53bdf2ea309
SHA1344b6ffb1ebd5b6bb06733301f82ef1e9790eab1
SHA25695f3e70aca60a38e3d832ce24b8889a3931c0fe929f494fece2939f6bbc51716
SHA5121b125d0a728c2f53085c6a670aeb56c258592b8420207d42cb9f662a0397844daccd0bfd5d72268788948b052775e3cdfea5a18624a719bb949dc387caa52a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54639dfc5368debb5b61c8ae5726e48b0
SHA1928006b57986d692d355c58a73cfd2ead7f21dfe
SHA256bd31b8bcf793864eb8eaf936e1be582635813ecb951798f82080870a20326a98
SHA51269d5594140d2e5abaf6238d94ec88f04aecf53cbcbdc00bd1a3b9983447b1e7f2e1943ae82c745a9728a363926e8ed5eb04e770935c65216b4b6737846b845bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df1ae793d8467ddecc5f34cd76c50d40
SHA151c7b764f3c36db1acf021ba7658946471508ed7
SHA256775e51a0583bcf4bd3dffcd53f124a1e5ef4c8a6998bd3c603825a7ce241bf23
SHA51252b2a48279cfae5ef0a9747c00119b5f9b564b847e9fe7a06bf8d4ace127a501c20f15aefeb1c82c4a706e4d23718de6e7fca1182519fd5c2f3308c79ba7c714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b4bbf98b3e8d39ba65fd846ee4e87a
SHA1463e161ad6ba60750c8aee5e67fc25d7fb7b3299
SHA256e7e075e683130b51b6a15f7dfefe61d288be40200c7e2b58011776a9b5ff6ef4
SHA512de1b722daa1ec127716636f6b985acc8ab82982212b5c146f4fcb83026a2480c3c39cfd2f7485d4b82a0f8e5cab7e2ae30c24e30c74b8935c64e3cfd0017cf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5ab96ad7f87964abee15a84f61ed0d
SHA13db10d9aeec84b3a9024f88a333be1a8715f4b2b
SHA25686de5d118f43e9b59bf3327038019a84c73e17e578643f7f3b3b8d4ff18b0f26
SHA512f722e85bdff1b6bcb8cec0759d39f3a598ee0f8bbf02e3c21c2fde3a50662c46cb9798c4dd3728a530ce4d79cd335ba2e4d848e274d84c3c8894156a1d039d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d5f4feee434c19d5893d863bc4f022
SHA1f79887948c989ee31e2bb86d47d16e528bd197e7
SHA256f8f1ae980eea72df489de6775070479ec72aa771de2580e7e496a081169ba30d
SHA512bfd384c03e561d13c8dda3dcf0dc2480c47f9760cae46b9b31ef7a47bf37a98610bd4712a5757c08047d8aa19210a298a3c3440cada57df015dde2942cb02098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b095b4cd2aeceaddb38089dd2e94846a
SHA193784ed9292ee7cf973885b113d1d743929a3cd8
SHA256f6498bb2e5b0b536820a2b8c6f0e6380160003ea21117de5631c4d7651bf5a3d
SHA512b1dc01e57f4cbe5a02fb212e3235a96c55a7ad4d44bde09d6382d8d4ae3ab00311d8d596f8915bcef73711811fe390f6c474d6a47bffcb718c1659d0c82ffe22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f5421538e4041cd6e0689bfbefedf11
SHA15291a7c6e5efe1f5a3987423e2f62a1fd20637d6
SHA2568075d5643a1b45b7248f17e2213446c3434ecd665aca140e9ecf1ec7192c0402
SHA51227eb3d1b8dbd4b80669c752b1c7e7578a41578d9dfb5272547238711fe9cc4ae00f10f9adcb812f813b0d7352825b0c79ba792874fdb6b3779180ae73ba899e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2e6c10c42df7b6ab6ab87f20afb927
SHA19c642226c07b25fc111df2c8abe5b77c966562c4
SHA256fc21819d5ea7ea3822c77292c1bc4beb88c237025a12f80c890a83aa98166cdd
SHA512a0abaa736dfd84f00afc9e8fac420b80139385ebf9c4a418bd59ff50f58a5e0a4139b85c77543f19b0c9ed49b83efcf573e3109fed671960b8bbd72d6971d02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5093912fd1694eb5cbec945381fd074b3
SHA135ee68bd96ed213ff60bd4e814c6069fa5d0b70b
SHA2569a1c90ef55431ad818339ff3fc67205dc01f3ba8af3329d52d96304e77a77177
SHA512fcc373b0a1428a6abcbb96eb08d53c69281ce7b29874067521136d6089f478414883bedfed9c41d525496e227be119f9e6a35684caf6217da75dfad35a5ea846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56987006a9b9d73c7477a33fb7d78cc85
SHA1b00ada75017d19a3c6ad01bfd47ac0f1a9bab7e0
SHA25600c37bca61c9aff1e573612d342e1ac6b5d8b19e03831fc17a8bf0963e42d1b1
SHA512e05e121a60b69a29260a67a04d9a59d08ef4852adcb13baaaff78a9ccdba27e50fd90afceec35a71c0e315efea651e7e3bc075a95bed0caf3ee306ea7375e197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55466fc0a9547d77dd002e8fa53b3c0e5
SHA1236f7f96f797d0bfcec2031b554e2c9829fc68f9
SHA25661c5e6da6778747e7de976a75b8789cc841036b44374d5ebc75df95e6fe455ca
SHA51244cb969bcb0cb966e47584ec89d80d2ef38b4e64f199f0e53bfa7b94955abebbc8c9a5fd32de3ddad2e0a1d6cb84d85e4f0a329e150c59e54bd414fe38ce3499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554daf7c069fdc7897192f430530abff2
SHA10bff2e2d0d453f60c9d9b3200c96d2222c99e6a4
SHA256efcfc4be01bed2f7f475e87cafb8f9729912112d8fd8b2889225ef096b109d10
SHA512870a51e12c6da7e00d809873d549b29e5bc801378deed49ccfdd470c8dc41310815fce475408b5027cbe07a532c3cbe1b157e3637f062e759afde22511f22169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563dd123627d2c1ba27e159a7ccaeb174
SHA1dcc8d3796388ab7f266691b13020f9f435554608
SHA25667bc83fa8ee92593baafc167bb956bab25c7e7761f81de96116d46221fa0f461
SHA51263df758131f63ff0493af752faac7ff7b6831d8a732e57387b79075a37c5936ffd2c3568a49e58e8f77f82fe09ff604a155862c2d98a6a3e7457ecdb53d1e8fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b