Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 03:48

General

  • Target

    f51b906ed2a5a762c0120a97c6db2c78_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    f51b906ed2a5a762c0120a97c6db2c78

  • SHA1

    44b20eaea11dd8965c2533bd13522d2c6528afbb

  • SHA256

    2dc6880f6b6a7324de7f63a0e62f267cc6a18490eb01aa8bd192cbd1d59ccf35

  • SHA512

    80fd42eeedb081bee398afd851840251cd0fe234c59d49ac50884eaefe6b570c4a8d83a18fbbb2b22558f48bf701ca7e6a17f84eb7b2a2e881fbedad0726961f

  • SSDEEP

    49152:w9TDQbDHVJ3DXPkxVpyOUS2Nz9Hua8Lc//////xcqTT4vDQ4dc//////HW2bn:w9QbDHrPkxSOU5uaCc//////x1wDjdc3

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f51b906ed2a5a762c0120a97c6db2c78_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f51b906ed2a5a762c0120a97c6db2c78_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Re2010.ini

    Filesize

    475B

    MD5

    3d789700820b287d288bbf0ba1fed5fa

    SHA1

    5aeed2783cf4adaa261d58b54680df04683e6a1a

    SHA256

    88b13dcb7cf3d1db49b81309cd1fe34e26530b65faa0801579cad2ed450e93c8

    SHA512

    7318f25066adcae4ec90959f4fcf3c392a3cfdd15a0db1f65ad50f4256b0dded3969b95eea3a079c1ebbb28180f4b353ecf804ec006175be0afc40933fd69f50

  • memory/1088-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1088-24-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/1088-25-0x00000000038A0000-0x00000000038A1000-memory.dmp

    Filesize

    4KB

  • memory/1088-34-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1088-35-0x0000000000400000-0x00000000006B0000-memory.dmp

    Filesize

    2.7MB

  • memory/1088-36-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/1088-37-0x00000000038A0000-0x00000000038A1000-memory.dmp

    Filesize

    4KB

  • memory/1088-38-0x0000000000400000-0x00000000006B0000-memory.dmp

    Filesize

    2.7MB