Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 04:42

General

  • Target

    e85a11e6222ea006a368a95d21dabd34_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    e85a11e6222ea006a368a95d21dabd34

  • SHA1

    aecae899106fb174e542ca97e3eb8c5ea147f071

  • SHA256

    a466539b34a42c8b990bf77251c40561e3817e8f046849647dbe1de6a0c75ef6

  • SHA512

    1e03626e6382fb852aba5d3ed6b5d2d4069d4c28f7d8b596399695df891727be755b878d831334c7b31fef51bd5eb399e2f54650234ed4380c2b24bd7dcd7c2d

  • SSDEEP

    3072:WZPWzKm5YbycJkn+6FAkKxwstpoFOEDUj0xXu3B/5:Y+V21kndTKtGfIjB/5

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e85a11e6222ea006a368a95d21dabd34_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e85a11e6222ea006a368a95d21dabd34_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Users\Admin\AppData\Local\Temp\e85a11e6222ea006a368a95d21dabd34_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2188

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1168-3-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1168-2-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1168-4-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1168-5-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1168-6-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1168-8-0x0000000010410000-0x0000000010449000-memory.dmp

      Filesize

      228KB

    • memory/1168-14-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB