Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/09/2024, 21:53

General

  • Target

    f492f74b7956b147a7cc182e43b95e80_JaffaCakes118.exe

  • Size

    332KB

  • MD5

    f492f74b7956b147a7cc182e43b95e80

  • SHA1

    f9f08ab8e41b2ea2c8031c165a6105f4f3a41625

  • SHA256

    b11b35c2cad049a2ded23b724bfab24a5959b7f14cd00fd039c521e7cfda5131

  • SHA512

    ac193abfbc4bd9cd5ff84d9b899019e7d8599a37c134502f6b81f228cc10810d960e3c4c8ec6dc04b44092b672598c0c62ed06f8b01e64e00be1ff1410d8ba29

  • SSDEEP

    6144:9Gmbf8dL9K3jaqdINNvq2vB+avIEOZl1iB5IlFnBAiFLzK:vMu/SDCcBfIzZDIIlFnBRC

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 24 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f492f74b7956b147a7cc182e43b95e80_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f492f74b7956b147a7cc182e43b95e80_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\f492f74b7956b147a7cc182e43b95e80_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f492f74b7956b147a7cc182e43b95e80_JaffaCakes118.exe
      2⤵
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Windows\mstwain32.exe
        "C:\Windows\mstwain32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2224
        • C:\Windows\mstwain32.exe
          C:\Windows\mstwain32.exe
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:540
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mstwain32.exe

    Filesize

    332KB

    MD5

    f492f74b7956b147a7cc182e43b95e80

    SHA1

    f9f08ab8e41b2ea2c8031c165a6105f4f3a41625

    SHA256

    b11b35c2cad049a2ded23b724bfab24a5959b7f14cd00fd039c521e7cfda5131

    SHA512

    ac193abfbc4bd9cd5ff84d9b899019e7d8599a37c134502f6b81f228cc10810d960e3c4c8ec6dc04b44092b672598c0c62ed06f8b01e64e00be1ff1410d8ba29

  • C:\YourCustomPath\acppage.dll

    Filesize

    44KB

    MD5

    38db21372ee1bfd22b95e3afba496147

    SHA1

    63f2b14d4865adf2d1291b13d7cbdbbb23dadbab

    SHA256

    6af8d74e6bf4d2c8f4e82180b413b0845e58bf03afa867fd685e3630ca299f78

    SHA512

    575b598202bcb563f896da581b0ebd914333eb6c5a9337537d891e84633a4cc50a3b063eea28f39c3cb1ccc93cd37ccc15e1a16b96679f766a18e7b01e3cdd79

  • memory/540-80-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-77-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-90-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-66-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-86-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-83-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-63-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-93-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-70-0x0000000001F70000-0x0000000001F7E000-memory.dmp

    Filesize

    56KB

  • memory/540-75-0x00000000003B0000-0x00000000003B8000-memory.dmp

    Filesize

    32KB

  • memory/540-76-0x0000000001F70000-0x0000000001F7E000-memory.dmp

    Filesize

    56KB

  • memory/540-74-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-73-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-72-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-96-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/540-61-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2032-16-0x00000000002C0000-0x00000000002D0000-memory.dmp

    Filesize

    64KB

  • memory/2032-1-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2032-19-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2084-6-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-9-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2084-32-0x0000000003F40000-0x0000000003F50000-memory.dmp

    Filesize

    64KB

  • memory/2084-17-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-15-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-37-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-22-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-21-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-20-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-4-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-12-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-8-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-31-0x0000000003F40000-0x0000000003F50000-memory.dmp

    Filesize

    64KB

  • memory/2084-11-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2084-10-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2224-62-0x0000000000230000-0x0000000000240000-memory.dmp

    Filesize

    64KB

  • memory/2224-38-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2224-65-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB