Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe
-
Size
180KB
-
MD5
e93aef6a932c5f316d7842b8d633b48d
-
SHA1
d9a513e55a5d951e25e5fdccec6b71bb84a2899e
-
SHA256
735110feb84713dfcf393f2c56379cc8faaa2726243bbf76f68424c6195bd9ef
-
SHA512
65df8e35317ae804f7a649a400626cd11f894e6a4a23f59c32f0c0b87b1690aa5ecdf4345d48ccaf5e18fc3095a3dbd2d4b2d22d0e1eb9913bd342b84cbbfddc
-
SSDEEP
3072:TTygEZjisnO5/l2SWOIjWLFGBiMiJsPHXgWPSVDvqT6UcrOQVbO4LiLS5UxiIYWk:TTygozCTWfKGcPOPwSSETS/1ESyxiIYp
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "explorer.exe\"C:\\Windows\\crss.exe\"," crss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Windows\\crss.exe\"" crss.exe -
ModiLoader Second Stage 12 IoCs
resource yara_rule behavioral2/memory/4436-1-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/4436-0-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/4436-2-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/4436-3-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/4436-4-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/4436-6-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/4436-39-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/1328-46-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/1328-47-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/1328-48-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/1328-49-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/1328-57-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run crss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\win32 = "C:\\Windows\\crss.exe" crss.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{TDR65V8A-55SJ-KCM4-7QGK-84R7WQO6DO30} crss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{TDR65V8A-55SJ-KCM4-7QGK-84R7WQO6DO30}\StubPath = "\"C:\\Windows\\crss.exe\"" crss.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2484 crss.exe 1328 crss.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3780 set thread context of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 2484 set thread context of 1328 2484 crss.exe 95 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\crss.exe e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe File opened for modification C:\Windows\crss.exe e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4436 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 4436 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 1328 crss.exe 1328 crss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 3780 wrote to memory of 4436 3780 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 89 PID 4436 wrote to memory of 2484 4436 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 94 PID 4436 wrote to memory of 2484 4436 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 94 PID 4436 wrote to memory of 2484 4436 e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe 94 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 2484 wrote to memory of 1328 2484 crss.exe 95 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97 PID 1328 wrote to memory of 384 1328 crss.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e93aef6a932c5f316d7842b8d633b48d_JaffaCakes118.exe2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\crss.exe"C:\Windows\crss.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\crss.exeC:\Windows\crss.exe4⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:384
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=2540,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4356 /prefetch:81⤵PID:2288
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5e93aef6a932c5f316d7842b8d633b48d
SHA1d9a513e55a5d951e25e5fdccec6b71bb84a2899e
SHA256735110feb84713dfcf393f2c56379cc8faaa2726243bbf76f68424c6195bd9ef
SHA51265df8e35317ae804f7a649a400626cd11f894e6a4a23f59c32f0c0b87b1690aa5ecdf4345d48ccaf5e18fc3095a3dbd2d4b2d22d0e1eb9913bd342b84cbbfddc