Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/12/2024, 20:40

General

  • Target

    db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    db709ffca16b90369f0feadd92730fec

  • SHA1

    167dcea6800303f9ba2fd28d82fdecd3feb2d160

  • SHA256

    77c0e470dfc8b4234cb665773a97b9b98864e993acbac3de284ee474160f556f

  • SHA512

    cfb446da9657ac4615f632133310f1e5fe21fe6e6ea61987be581f122fe4181aa6985626333291f119adedfb76dfbacca1e063879686f3caf3be8e70b4f81bb2

  • SSDEEP

    49152:xdc6IDfhIOnpoDrwQs+bLc4SexDWDwRZuc2qdL3ejAq1n2:xdcLDfhI2sHs871xDWDAZOWajP12

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5088
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xtqmzs-s.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB15E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8351797D300442B1AB67E1935747EAC8.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1300
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xtqmzs-s.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB20A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEAF83AC0CB5C4F26AF5669BD285D7F6.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1592
    • C:\Users\Admin\AppData\Roaming\728980.exe
      "C:\Users\Admin\AppData\Roaming\728980.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:828
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\\vbc.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3444
      • C:\Users\Admin\AppData\Roaming\AdobeART.exe
        "C:\Users\Admin\AppData\Roaming\AdobeART.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lgrgribq.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2952
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB7C7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc692DA7218406426F9F8656C5ED3EA41.TMP"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3504
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lgrgribq.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB844.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA1E8BC38C3E42609389A695E6934BF8.TMP"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2856
        • C:\Users\Admin\AppData\Roaming\728980.exe
          "C:\Users\Admin\AppData\Roaming\728980.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1796
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\\vbc.exe"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\728980.exe.log

    Filesize

    116B

    MD5

    fbcc48ddf361df41da6b0400718841f8

    SHA1

    b6d3641dc3c8186662f3906a350e355f47e373e3

    SHA256

    ecb300191d0e3420d114338ed6850afa649b270f75c181ffe86b435420100870

    SHA512

    1d9d8e3335423152e7b19bc3b0ac8f04d318c342cfeb1567b9b82f0dde0e3d3f57c3fb7c312fbca7d9f46ba2383f32a2abc90df9a924f27da43f854bd490e578

  • C:\Users\Admin\AppData\Local\Temp\RESB15E.tmp

    Filesize

    1KB

    MD5

    2fd753a309cc712d54c49783b784c371

    SHA1

    cc05d8a06cd55120036dd981e7454738185f61e6

    SHA256

    494a0835afd74e82a893d05d610c9ac7c5ee1447c55dd498715235c3a7c7d2b4

    SHA512

    8630b61c95835124b89308a7bf3b587790293e1cbf0495171375020320c88d864668db6eb6cdbe0e86572cd5e70e747815214ec103afa970f8db68f94c74bc08

  • C:\Users\Admin\AppData\Local\Temp\RESB20A.tmp

    Filesize

    1KB

    MD5

    38bdddcb09fc6e554c64f7affbcced25

    SHA1

    3387f913bda16cb46d1993922d52eb4a0714aa23

    SHA256

    def5b14059f5ef4ce1675096214c0f37edd9e34523bac06e4959bf53c3d93ff9

    SHA512

    0b9d26b95198ca874bd6dcfda74b4ab631e5f10044a659550a5ecd9bab45eac3d7e510950c4d1bca0fd4b91151ebb943c81a5f353404ed91646a2d9f5eaaa819

  • C:\Users\Admin\AppData\Local\Temp\RESB7C7.tmp

    Filesize

    1KB

    MD5

    32331a064d49d21fa9021999211f38d9

    SHA1

    b22789a19728ed0a5f3d30ebe6761e69c8211e1c

    SHA256

    60ce016dfd7325f3fcdf2ecefea0addec6d5a1cb81dfd9d07a8075a98e624765

    SHA512

    040c10508a17be3cb85e4737a35c94a1f28c4fee5ca8ce600f49c69c5b16f0a008b81fe50a9b9006290c01bade5c341a39316ce8a824aa549145ab42637fbaf1

  • C:\Users\Admin\AppData\Local\Temp\RESB844.tmp

    Filesize

    1KB

    MD5

    4a3f3225457275e4bc68481c02437c05

    SHA1

    99ffaded321a699b743a4d3bd2954dbb56c3b152

    SHA256

    5245965bcbba85d48785dc0f838dd750914105345bf68b78ad4d2d0f73091a61

    SHA512

    6be47c2392853ae76fbac579556b7ec81cd8a1a9384a80bbff1f468c75dc04ef8811346b3ab6d1be33b5a12b6b1cb837c1ffe1d8cdc3fe24d86fbc50534d33e5

  • C:\Users\Admin\AppData\Local\Temp\lgrgribq.0.vb

    Filesize

    1KB

    MD5

    c2d9742959254e08a98749a3150f4aaf

    SHA1

    7c8053feff1809b54af266576975fae7f6a8344e

    SHA256

    671999e918b8b3a339c86366e359400a2596abc3bed6a4bb484bc759cb7b2449

    SHA512

    dca6f970b953f6ce29bb45792822e5c60ecad6299cc975118c489cf6e40643357ab808b1d719e20231190db4e2517baf3cf319cb3db5f6eead6733999ed5f7c2

  • C:\Users\Admin\AppData\Local\Temp\lgrgribq.cmdline

    Filesize

    211B

    MD5

    793e2c3b6578167071e859021e1cc096

    SHA1

    f400f8cc4c67ddf685bf24c008604ed932db063e

    SHA256

    5f68d25f37c3ae3a5d2d4375c3249e814349fb349596c63230b63fd1d2bf9d10

    SHA512

    836401e2a7b1ab12751dbc10d3cc073d431a51f9aaffa10f91f654defcccf4ff94801c4754ac14561434e73f40d36fab663cf13b67ba4167a3b53413e24afb6f

  • C:\Users\Admin\AppData\Local\Temp\vbc8351797D300442B1AB67E1935747EAC8.TMP

    Filesize

    940B

    MD5

    75189b4aad9a73d622481d4c815913fa

    SHA1

    0c7732c0981764b438958a2a025f0befbe2a8562

    SHA256

    dc7255857f258a57764b8d68318929d5f6540fb62ddd2b4e86937cff96385440

    SHA512

    84115e34f26f4b8fc1476d4ca7c8ddca1db4e864d04fc11fc123f4948a75c4c69697b9b43e8646011261f4460e1c5b1e714781e17cca3d68c1979932a63b074a

  • C:\Users\Admin\AppData\Local\Temp\xtqmzs-s.0.vb

    Filesize

    1KB

    MD5

    900f62120d2114145c303882969f0658

    SHA1

    8f3a5756f0404772ea6b16d3f49d88425aa912bc

    SHA256

    bfd99e5dbb5a7b4b438ade81e9bd4a7bc1a8e4338736b75b1417787533a2aa82

    SHA512

    2651d9bd94939c6eaedd368550216135ddcdc4b1769626f147ea1efd84c3b31d1829baaaca21f65f0b9f85890e10bac65e2563847ab622773d095b68c43bc129

  • C:\Users\Admin\AppData\Local\Temp\xtqmzs-s.cmdline

    Filesize

    211B

    MD5

    da2c4b4fc9f2c6f03dba3f36e89c2542

    SHA1

    e1524ff98185034c85897b08037fbb7039950ffe

    SHA256

    3bb812be009249abcf8f37806f004ef8900d5a2920ce35755afd47f9d574e9ef

    SHA512

    5dc7c275b917cc5f36b7b62cc78e5e9e6df0bff148530fecaf53ecd02cde4f8f123a17757fdb9475aa18e505647f8acdeb8e50c0317856dceb126f240aea9e1f

  • C:\Users\Admin\AppData\Roaming\728980.exe

    Filesize

    7KB

    MD5

    be834812199f2c6e224ebdbeea61cf1e

    SHA1

    3ce8dab9c5c95b68ce34cd66055ee5eb51bd7e0e

    SHA256

    e02eea9e8227c9e744825de55f83174543090e96a9b1826de0487e79382aff22

    SHA512

    8c0f1ba34f2674462540d3f2c7467fc08273301bf7ea14871643621a6bf3b7ea29b6f9dc6a9d25c2ef27fa9fb652817703b4e32ee175c5d91e6868862ffc7361

  • C:\Users\Admin\AppData\Roaming\728980.exe

    Filesize

    7KB

    MD5

    ca0699150d45422b51a95a218ddc410d

    SHA1

    7f4bbe3c82d81fb21ae438ec90c317bb70636009

    SHA256

    76edf1b93ed3d37358903aad9828e7f63e9e1150572d06031851acff35213b94

    SHA512

    6e3328118769e8afd975cdace8077f6ce6c66833264ea33ab3b73be063744e4527ebc6049dc37a94b16664b2ebc92f3076902c2e15537bc2f70ba0fdf16844f8

  • C:\Users\Admin\AppData\Roaming\728980.exe

    Filesize

    7KB

    MD5

    a2fec8f72b040089b1337a84be04b533

    SHA1

    863f33477f6bd3b33eda6c5ca9d8d644fd5dbafa

    SHA256

    cc540fa01a500a590bd6aabc1f539dbc7d481dd2467c4be404765354b804b55e

    SHA512

    4eab976b3983a4a45338b56e205d193f387407b1c0821069133e983dd814bc0cb042fb5bfec87e201cee2da9ed6bfed0c7d6b81806ed2aab18dd28fc8ed4b77c

  • C:\Users\Admin\AppData\Roaming\728980.exe

    Filesize

    7KB

    MD5

    9e482b27e39722b51434067a0f56530e

    SHA1

    a7366f51550a265176cf8ddf261ab9676870e285

    SHA256

    6a00cdefd2f0501e7067d8c53946af1b7083a106cb2e0c0db8808895483eac7e

    SHA512

    5d3af92dba33d4001a275f10ade23f2f070790e0292c0800fd1197cc803902c8801a0771e0dfe4dd8c78b9d41643d5051b93ee289c85925dc0348f1e844b1200

  • C:\Users\Admin\AppData\Roaming\AdobeART.exe

    Filesize

    2.0MB

    MD5

    db709ffca16b90369f0feadd92730fec

    SHA1

    167dcea6800303f9ba2fd28d82fdecd3feb2d160

    SHA256

    77c0e470dfc8b4234cb665773a97b9b98864e993acbac3de284ee474160f556f

    SHA512

    cfb446da9657ac4615f632133310f1e5fe21fe6e6ea61987be581f122fe4181aa6985626333291f119adedfb76dfbacca1e063879686f3caf3be8e70b4f81bb2

  • memory/1340-10-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/1340-18-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/1748-34-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/1748-29-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/2256-85-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2256-88-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3444-38-0x0000000000030000-0x0000000000032000-memory.dmp

    Filesize

    8KB

  • memory/3444-53-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3444-40-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/5088-43-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/5088-2-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/5088-1-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/5088-0-0x00000000748F2000-0x00000000748F3000-memory.dmp

    Filesize

    4KB