Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 19:40 UTC

General

  • Target

    e3413a0f105a236fbd09f087a28e00db_JaffaCakes118.exe

  • Size

    501KB

  • MD5

    e3413a0f105a236fbd09f087a28e00db

  • SHA1

    39adcb0d09c5ea025f9d054af726677449fba83c

  • SHA256

    130ab1ecbdb265e14259736e10bef5e5dc03aaaa933f379432c484c0d7b0a832

  • SHA512

    191bb96ed02df7079c4f45a010e4f88e900d967059c649ab27097f3901a5683f602f628d6170f8a895a7434f533056dd5de444fd478e1bb5e1644d8a23a3fd8d

  • SSDEEP

    12288:aan072eNdNOWEJ1db1J9/0JmcPcl9cBqNtTird:a20hwLdEclOBuTEd

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 37 IoCs
  • Executes dropped EXE 23 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Loads dropped DLL 46 IoCs
  • Adds Run key to start application 2 TTPs 23 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 24 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 46 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3413a0f105a236fbd09f087a28e00db_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e3413a0f105a236fbd09f087a28e00db_JaffaCakes118.exe"
    1⤵
    • Impair Defenses: Safe Mode Boot
    • Loads dropped DLL
    • Adds Run key to start application
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\vssms32.exe
      "C:\Windows\system32\vssms32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\SysWOW64\vssms32.exe
        "C:\Windows\system32\vssms32.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Writes to the Master Boot Record (MBR)
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\SysWOW64\vssms32.exe
          "C:\Windows\system32\vssms32.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Writes to the Master Boot Record (MBR)
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2552
          • C:\Windows\SysWOW64\vssms32.exe
            "C:\Windows\system32\vssms32.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Writes to the Master Boot Record (MBR)
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2104
            • C:\Windows\SysWOW64\vssms32.exe
              "C:\Windows\system32\vssms32.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Writes to the Master Boot Record (MBR)
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1472
              • C:\Windows\SysWOW64\vssms32.exe
                "C:\Windows\system32\vssms32.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Writes to the Master Boot Record (MBR)
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2716
                • C:\Windows\SysWOW64\vssms32.exe
                  "C:\Windows\system32\vssms32.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Writes to the Master Boot Record (MBR)
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1840
                  • C:\Windows\SysWOW64\vssms32.exe
                    "C:\Windows\system32\vssms32.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    • Writes to the Master Boot Record (MBR)
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:3048
                    • C:\Windows\SysWOW64\vssms32.exe
                      "C:\Windows\system32\vssms32.exe"
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • Writes to the Master Boot Record (MBR)
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:2200
                      • C:\Windows\SysWOW64\vssms32.exe
                        "C:\Windows\system32\vssms32.exe"
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Adds Run key to start application
                        • Writes to the Master Boot Record (MBR)
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:2116
                        • C:\Windows\SysWOW64\vssms32.exe
                          "C:\Windows\system32\vssms32.exe"
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Adds Run key to start application
                          • Writes to the Master Boot Record (MBR)
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:1592
                          • C:\Windows\SysWOW64\vssms32.exe
                            "C:\Windows\system32\vssms32.exe"
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Adds Run key to start application
                            • Writes to the Master Boot Record (MBR)
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:784
                            • C:\Windows\SysWOW64\vssms32.exe
                              "C:\Windows\system32\vssms32.exe"
                              14⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Adds Run key to start application
                              • Writes to the Master Boot Record (MBR)
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:1572
                              • C:\Windows\SysWOW64\vssms32.exe
                                "C:\Windows\system32\vssms32.exe"
                                15⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Adds Run key to start application
                                • Writes to the Master Boot Record (MBR)
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:900
                                • C:\Windows\SysWOW64\vssms32.exe
                                  "C:\Windows\system32\vssms32.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Adds Run key to start application
                                  • Writes to the Master Boot Record (MBR)
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of WriteProcessMemory
                                  PID:1904
                                  • C:\Windows\SysWOW64\vssms32.exe
                                    "C:\Windows\system32\vssms32.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Adds Run key to start application
                                    • Writes to the Master Boot Record (MBR)
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    PID:3032
                                    • C:\Windows\SysWOW64\vssms32.exe
                                      "C:\Windows\system32\vssms32.exe"
                                      18⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Adds Run key to start application
                                      • Writes to the Master Boot Record (MBR)
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      PID:2812
                                      • C:\Windows\SysWOW64\vssms32.exe
                                        "C:\Windows\system32\vssms32.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Adds Run key to start application
                                        • Writes to the Master Boot Record (MBR)
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        PID:2872
                                        • C:\Windows\SysWOW64\vssms32.exe
                                          "C:\Windows\system32\vssms32.exe"
                                          20⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Adds Run key to start application
                                          • Writes to the Master Boot Record (MBR)
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          PID:1460
                                          • C:\Windows\SysWOW64\vssms32.exe
                                            "C:\Windows\system32\vssms32.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Adds Run key to start application
                                            • Writes to the Master Boot Record (MBR)
                                            • Drops file in System32 directory
                                            • System Location Discovery: System Language Discovery
                                            PID:2532
                                            • C:\Windows\SysWOW64\vssms32.exe
                                              "C:\Windows\system32\vssms32.exe"
                                              22⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Adds Run key to start application
                                              • Writes to the Master Boot Record (MBR)
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              PID:1072
                                              • C:\Windows\SysWOW64\vssms32.exe
                                                "C:\Windows\system32\vssms32.exe"
                                                23⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Adds Run key to start application
                                                • Writes to the Master Boot Record (MBR)
                                                • Drops file in System32 directory
                                                • System Location Discovery: System Language Discovery
                                                PID:688
                                                • C:\Windows\SysWOW64\vssms32.exe
                                                  "C:\Windows\system32\vssms32.exe"
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Writes to the Master Boot Record (MBR)
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2792

Network

    No results found
  • 127.0.0.1:135
    e3413a0f105a236fbd09f087a28e00db_JaffaCakes118.exe
  • 127.0.0.1:49155
    e3413a0f105a236fbd09f087a28e00db_JaffaCakes118.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
  • 127.0.0.1:135
    vssms32.exe
  • 127.0.0.1:49155
    vssms32.exe
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\vssms32.exe

    Filesize

    501KB

    MD5

    e3413a0f105a236fbd09f087a28e00db

    SHA1

    39adcb0d09c5ea025f9d054af726677449fba83c

    SHA256

    130ab1ecbdb265e14259736e10bef5e5dc03aaaa933f379432c484c0d7b0a832

    SHA512

    191bb96ed02df7079c4f45a010e4f88e900d967059c649ab27097f3901a5683f602f628d6170f8a895a7434f533056dd5de444fd478e1bb5e1644d8a23a3fd8d

  • memory/688-152-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/784-108-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/784-112-0x0000000003EF0000-0x0000000003FCE000-memory.dmp

    Filesize

    888KB

  • memory/784-115-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/900-121-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/900-126-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1072-149-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1460-142-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1460-144-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1472-62-0x0000000004240000-0x000000000431E000-memory.dmp

    Filesize

    888KB

  • memory/1472-65-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1572-113-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1572-120-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1592-100-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1592-107-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1840-76-0x0000000004490000-0x000000000456E000-memory.dmp

    Filesize

    888KB

  • memory/1840-79-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1904-131-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2104-55-0x0000000004280000-0x000000000435E000-memory.dmp

    Filesize

    888KB

  • memory/2104-51-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2104-54-0x0000000004280000-0x000000000435E000-memory.dmp

    Filesize

    888KB

  • memory/2104-58-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2116-102-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2116-97-0x0000000005650000-0x000000000572E000-memory.dmp

    Filesize

    888KB

  • memory/2116-96-0x0000000005650000-0x000000000572E000-memory.dmp

    Filesize

    888KB

  • memory/2116-93-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2200-99-0x00000000057E0000-0x00000000058BE000-memory.dmp

    Filesize

    888KB

  • memory/2200-88-0x00000000057E0000-0x00000000058BE000-memory.dmp

    Filesize

    888KB

  • memory/2200-92-0x00000000057E0000-0x00000000058BE000-memory.dmp

    Filesize

    888KB

  • memory/2200-91-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2328-6-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/2328-7-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/2328-12-0x0000000000510000-0x0000000000511000-memory.dmp

    Filesize

    4KB

  • memory/2328-11-0x00000000004E0000-0x00000000004E1000-memory.dmp

    Filesize

    4KB

  • memory/2328-5-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/2328-10-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2328-8-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2328-2-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2328-15-0x0000000000270000-0x00000000002B3000-memory.dmp

    Filesize

    268KB

  • memory/2328-26-0x00000000043A0000-0x000000000447E000-memory.dmp

    Filesize

    888KB

  • memory/2328-13-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/2328-1-0x0000000000270000-0x00000000002B3000-memory.dmp

    Filesize

    268KB

  • memory/2328-14-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2328-4-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2328-3-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2328-9-0x0000000000380000-0x0000000000381000-memory.dmp

    Filesize

    4KB

  • memory/2328-28-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/2328-25-0x00000000043A0000-0x000000000447E000-memory.dmp

    Filesize

    888KB

  • memory/2328-0-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2328-32-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2532-145-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2532-147-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2552-50-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2552-43-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2552-49-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2716-72-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2716-66-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2716-69-0x0000000004000000-0x00000000040DE000-memory.dmp

    Filesize

    888KB

  • memory/2752-45-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2792-150-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2812-138-0x0000000004070000-0x000000000414E000-memory.dmp

    Filesize

    888KB

  • memory/2812-140-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2868-39-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2868-35-0x0000000000280000-0x00000000002C3000-memory.dmp

    Filesize

    268KB

  • memory/2868-29-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2868-34-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2868-30-0x0000000000280000-0x00000000002C3000-memory.dmp

    Filesize

    268KB

  • memory/2872-141-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2872-143-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/3032-137-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/3032-134-0x00000000042E0000-0x00000000043BE000-memory.dmp

    Filesize

    888KB

  • memory/3048-85-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/3048-82-0x0000000005820000-0x00000000058FE000-memory.dmp

    Filesize

    888KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.