Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe
-
Size
516KB
-
MD5
3fe92962081da9d708ca7cff7b7b0397
-
SHA1
996dc5e2dcc4fe91b0c8d78358ef5a9c8535aa1c
-
SHA256
ef39ddd79c5b9f22df70d6c782396da33f14cf6d1b9cc4de1fa58b39a26d1ebe
-
SHA512
03ea9e75e117d429911e9e4ad276f4e654c50bb18e3ffbe6f82a4bedc5df520651007db7d975edf2523a5a2514e79de06b67c4bbc4e743878ba818e5cb2e2ef5
-
SSDEEP
12288:nL7p0EULtPHTT6olPioaZNjLZF/ut8sgU7EHme8PzJEjMm:nL7pjUxX6Ck/fZctEUgmeIzJEY
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2300-29-0x00000000002B0000-0x00000000002CF000-memory.dmp modiloader_stage2 behavioral1/memory/2236-32-0x0000000000220000-0x000000000023F000-memory.dmp modiloader_stage2 behavioral1/memory/2300-67-0x00000000002B0000-0x00000000002CF000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2300 пî¼ÓËÙÆ÷.exe 2236 2.exe -
Loads dropped DLL 11 IoCs
pid Process 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 2236 2.exe 2300 пî¼ÓËÙÆ÷.exe 2300 пî¼ÓËÙÆ÷.exe 2300 пî¼ÓËÙÆ÷.exe 2300 пî¼ÓËÙÆ÷.exe 2300 пî¼ÓËÙÆ÷.exe 2300 пî¼ÓËÙÆ÷.exe 2300 пî¼ÓËÙÆ÷.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 18 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\aspeeder\WinIo.dll пî¼ÓËÙÆ÷.exe File opened for modification C:\Program Files (x86)\aspeeder\JSHJ.dll пî¼ÓËÙÆ÷.exe File created C:\Program Files (x86)\aspeeder\WinIo.vxd пî¼ÓËÙÆ÷.exe File created C:\Program Files (x86)\aspeeder\WinIo.dll пî¼ÓËÙÆ÷.exe File created C:\Program Files (x86)\aspeeder\JSHJ.dll пî¼ÓËÙÆ÷.exe File created C:\Program Files (x86)\aspeeder\ReadMe.txt пî¼ÓËÙÆ÷.exe File created C:\Program Files (x86)\aspeeder\FAQ.txt пî¼ÓËÙÆ÷.exe File opened for modification C:\Program Files (x86)\aspeeder\aspeeder.exe пî¼ÓËÙÆ÷.exe File created C:\Program Files (x86)\aspeeder\aspeeder.exe пî¼ÓËÙÆ÷.exe File opened for modification C:\Program Files (x86)\aspeeder\WinIo.vxd пî¼ÓËÙÆ÷.exe File opened for modification C:\Program Files (x86)\aspeeder\License.txt пî¼ÓËÙÆ÷.exe File created C:\Program Files (x86)\aspeeder\License.txt пî¼ÓËÙÆ÷.exe File created C:\Program Files (x86)\aspeeder\uninstall.exe пî¼ÓËÙÆ÷.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll 2.exe File opened for modification C:\Program Files (x86)\aspeeder\WinIo.sys пî¼ÓËÙÆ÷.exe File created C:\Program Files (x86)\aspeeder\WinIo.sys пî¼ÓËÙÆ÷.exe File opened for modification C:\Program Files (x86)\aspeeder\ReadMe.txt пî¼ÓËÙÆ÷.exe File opened for modification C:\Program Files (x86)\aspeeder\FAQ.txt пî¼ÓËÙÆ÷.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language пî¼ÓËÙÆ÷.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2300 пî¼ÓËÙÆ÷.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2236 2.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2300 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2300 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2300 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2300 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2300 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2300 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2300 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2236 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2236 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2236 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 31 PID 2536 wrote to memory of 2236 2536 3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3fe92962081da9d708ca7cff7b7b0397_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\пî¼ÓËÙÆ÷.exe"C:\Users\Admin\AppData\Local\Temp\пî¼ÓËÙÆ÷.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5df01d76736107080fb48dd38bf110f0c
SHA11a51f3988cf4c60010ea8b0d9cf45d0427f3df38
SHA2569dc0ad7de80ca7f5a61baa95eec4724104a9d20d12d36aa606406c90c50541c9
SHA512284a30d831a59f505f28199182d514eac79f757b68defd249a90ee964a85b189cd2777c004d642303d7ed948caa3ebeed84b51c3a99f43286d1143b2a810ab23
-
Filesize
353KB
MD59f184392d5bfae8c01cb980cff21d4e9
SHA1c3a5dbe9cc2179710c2ccdc282a9213bf771f1ab
SHA256a8fce5cc5acbb85852d3207369fcc331b34824055cad435c06973d1bfeddad33
SHA512f5f95e906556a84f022f1e5d3ee56c0fa9f56778dbfa4b45c62e24b77b3d08530480b0146d91f1d4102cc7c63da758aeb97241e7f8d400e748516222dc8fc0fa
-
Filesize
25KB
MD5b556c1ecbf66dd5da363e15b2e9f6a9a
SHA153d57009e9bd44f138852d62e110e5c3adfc6731
SHA25656534371b59b12b42248193b5434e277d5e45c13b6df816c023fa78627e17a15
SHA51201f10638a2b76b04adb1791b9c01f3b338d52426c71ab83fba06821217f7dba53b636a19a927612508c8a483fd063884b72df814e65b49fefd8309d5d4dee895
-
Filesize
36KB
MD5efe8c10e084cebe94d3842961e262342
SHA178d23843c5ed7e28985ab01e33f01e3199af4c8e
SHA256f7d31ad0f57361efe6cdbf3e3044aa1e5dd5eccee498806a3b2cecde8d1d4697
SHA512b4390586461ac598be92c233c01f5b94ce214ee66766d3125104bfaa286945f84610af23f4e9b60dfb47d090d5a4569a10d540b8ddbd227932bf40b21715195d
-
Filesize
430KB
MD533303856d356c36e2d62201dfde44bbf
SHA1165ba9739daaad5e2d0af4de0bf9d2420e6f33e3
SHA2569c388f36169b58adda76792d050eda6877b4bd6d7fe6b698db5a5f9570250c6e
SHA51236c6f93e76ef314de1509ae696d114287c9faa641b6d67ddf8514364cfb0c56f64ae26e9a9299097d3198c0121b0b42505d1b57e902cf90169949310178bd986