Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/09/2024, 02:33

General

  • Target

    e5e033f70a25c0feb59a0690bc26d9ca_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    e5e033f70a25c0feb59a0690bc26d9ca

  • SHA1

    2c3b1f7a1bdf66e6620d2823531a0ab1de766a1a

  • SHA256

    9ad39077181fbcf10e4fabafdb5a29f5aaf92c8096b71e2cce6a3f104fbd7b11

  • SHA512

    70e842035ca5f8a5063005aae1de093d81d6825f16e85c9fbc19ddd40ffff8920f857a5daf3ed47deba7fdb4a018fd3ca4fa16e811bedc9c51a8d97fb1310df9

  • SSDEEP

    24576:4z4ycZBRC7GW0MLFsSv2qOZWNlERKxRaBGNoifdGhwSx0bmcUZUXt0b:4zuZrHLcFsSY4NiKxloif4hv0bPt

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5e033f70a25c0feb59a0690bc26d9ca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e5e033f70a25c0feb59a0690bc26d9ca_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Re2007.ini

    Filesize

    213B

    MD5

    c2a69c4a212dac702393431bd6de5a39

    SHA1

    d68bb1acc829d2466683e6bf03c5dd4251b1cfa0

    SHA256

    459f3e18ce0323da1394362c5f6f5c8bf6c2d8b0fcf820fb78aa706b068467f5

    SHA512

    c93a4cc8eb0f26ef736610598e6417b9b53deb8b01ff3fc5b0fe666e6481a5cb57ca00cdf6f515e98d5eeb67e965fcf86625fb8e32594412921ef7e611c46de7

  • memory/3064-0-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/3064-1-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/3064-14-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/3064-18-0x0000000003510000-0x0000000003511000-memory.dmp

    Filesize

    4KB

  • memory/3064-19-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/3064-20-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB