Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 07:26
Behavioral task
behavioral1
Sample
e0705c0d813c8ff7fabb4cb307559a24_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e0705c0d813c8ff7fabb4cb307559a24_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
e0705c0d813c8ff7fabb4cb307559a24_JaffaCakes118.dll
-
Size
27KB
-
MD5
e0705c0d813c8ff7fabb4cb307559a24
-
SHA1
abf37ed461f76f4b1681f5e230adfbbc0e9a5028
-
SHA256
623d5cc3bce00dae7d418df7e0aae677c4559d4c319aa9b6835f2963a58912a4
-
SHA512
7cc9d82e7e33040262607f446729b7895077c3eef6c4390f3ebf26a3558aa9105304dd7b85fda73335fd4e06fa644aea2d13e969cd152c388b78f6214007b267
-
SSDEEP
384:2AAHxUSCqujwHKnGQmQwt83EEPT9/qgfi1vOpBlbQtylykECkfm6TJqCAzK9Enmv:YKSCquMH0GQUs9/Hq5OpBlkoPpm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/3060-0-0x0000000000100000-0x000000000010C000-memory.dmp modiloader_stage2 -
Blocklisted process makes network request 2 IoCs
flow pid Process 3 3060 rundll32.exe 4 3060 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3060 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\urls.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\urls.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2916 wrote to memory of 3060 2916 rundll32.exe 30 PID 2916 wrote to memory of 3060 2916 rundll32.exe 30 PID 2916 wrote to memory of 3060 2916 rundll32.exe 30 PID 2916 wrote to memory of 3060 2916 rundll32.exe 30 PID 2916 wrote to memory of 3060 2916 rundll32.exe 30 PID 2916 wrote to memory of 3060 2916 rundll32.exe 30 PID 2916 wrote to memory of 3060 2916 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0705c0d813c8ff7fabb4cb307559a24_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0705c0d813c8ff7fabb4cb307559a24_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52ee1e467d73642afddb03019f58c252b
SHA1ea1f3b03f46db029a955190692cecbc571e1d46c
SHA2565a7d5dafe22082b3ed035d640578ed7b5005edfe80e5c911774ec77a2caff1b3
SHA5123482715d7c9adbfe61f7834120d1a8fce47ae5d70add285ddcfe8802a5d4a95ae00ae82079b9b9639c5d4fa5126ecfc61e1b09a141c0fea86926e26fc22f9082