Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe
-
Size
180KB
-
MD5
e189768c394785e0604c98b9dad150d9
-
SHA1
a60a6b7b228ea4c680ef49f46ffd385a43e66b8d
-
SHA256
dc1e362c5a4d1f149b899055345e1918c35dc17ebfcd3586739e9f1820270138
-
SHA512
427776eafc10c2ced5e9f074d00b306b7ea840daf301f6c0e2b0d04bc398829c243c8cb094482057e86064920641ab145621311f71389d0e4ab31ca19fdc0ef4
-
SSDEEP
3072:IRorUPEGTTYJ8J19b6ue97KlQ1YUhSTJqIoH5vcuy1qiMwP0bCbX:S3PEG/Y2JGL97j1YUhSiZvcuy/MwPOkX
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/files/0x00080000000156a6-14.dat modiloader_stage2 behavioral1/memory/2704-40-0x0000000020000000-0x0000000020047000-memory.dmp modiloader_stage2 -
Executes dropped EXE 4 IoCs
pid Process 2704 auto2.exe 2848 auto2.exe 2608 AutoClick Rosa!.exe 3004 auto.exe -
Loads dropped DLL 7 IoCs
pid Process 2688 e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe 2688 e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe 2688 e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe 2704 auto2.exe 2848 auto2.exe 2848 auto2.exe 2848 auto2.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\aplib.dll e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2704 set thread context of 2848 2704 auto2.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language auto2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language auto2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoClick Rosa!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2848 auto2.exe 2848 auto2.exe 2848 auto2.exe 2848 auto2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2688 e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2704 2688 e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2704 2688 e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2704 2688 e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2704 2688 e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2848 2704 auto2.exe 31 PID 2704 wrote to memory of 2848 2704 auto2.exe 31 PID 2704 wrote to memory of 2848 2704 auto2.exe 31 PID 2704 wrote to memory of 2848 2704 auto2.exe 31 PID 2704 wrote to memory of 2848 2704 auto2.exe 31 PID 2704 wrote to memory of 2848 2704 auto2.exe 31 PID 2848 wrote to memory of 2608 2848 auto2.exe 32 PID 2848 wrote to memory of 2608 2848 auto2.exe 32 PID 2848 wrote to memory of 2608 2848 auto2.exe 32 PID 2848 wrote to memory of 2608 2848 auto2.exe 32 PID 2848 wrote to memory of 3004 2848 auto2.exe 33 PID 2848 wrote to memory of 3004 2848 auto2.exe 33 PID 2848 wrote to memory of 3004 2848 auto2.exe 33 PID 2848 wrote to memory of 3004 2848 auto2.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e189768c394785e0604c98b9dad150d9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\auto2.exe"C:\Users\Admin\AppData\Local\Temp\auto2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\auto2.exeC:\Users\Admin\AppData\Local\Temp\auto2.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\AutoClick Rosa!.exe"C:\Users\Admin\AppData\Local\Temp\AutoClick Rosa!.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\auto.exe"C:\Users\Admin\AppData\Local\Temp\auto.exe"4⤵
- Executes dropped EXE
PID:3004
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD56360dc57fe3ab5f4cac5e3911cf7975a
SHA1f1a5afc891b7bd72a0fea85c2a22e27d3dddf537
SHA256c6ed427e4058260833f10e94cf99c09e5d26590813903ee4ac97031b3ca79ccc
SHA512d6a57fe5fc04a7597fa6915736c0ddd67a87b705a0868dc4c5e2e5265dede32302f662df6d52ff002179b415761afe2332ed2a4d70576108ad82e137c3076dfc
-
Filesize
65KB
MD509025bc1e7c88c1062e045d5c07e6c56
SHA17a464d43fff97f144317ee72a72319c0786f4c5c
SHA256551a9db30d691fa19ef3a3a334c6a5297945229556b4bdfce47ff911c5aa29c4
SHA5129ff91c6f0779893515b9b12a465bda5d176e43d654b12a832e23adb07bbce2e430ae55381928be9befe349da45d2911d70bb3a1f3ac4b94cece3d27276ccd408
-
Filesize
74KB
MD53a3f6bfa98d790d788bb36357cbbc7d8
SHA1025649c314e9fa30c1b8a44a582a77b6175b680b
SHA256259d623c4d5a3e03a88737d5d70eb75284c676b90fbaf48a03042b661b58aaff
SHA512857042f4dbe326b6d31e80076fb48d58f900c570103ac5ea368d7c9b77fa93deef49956553d005a02a4222cb74dbcfec04e759460277710bf39f8eb0e1654e19
-
Filesize
12KB
MD535d174edd3c0bcfa9a32dce19e1abeb9
SHA1c22638e64f8a5f34809811a2c286ae2f115028f8
SHA25634194aa58d0eb70b513ea6a876a4f35ba6cc2f19c4fb6d408dd05580dcc74b04
SHA512f807df3655e6dd0cea2412ae82aa7b3babe3862fa9eee5d38673ee30b26a528b9618e1a25d3a58ef1ff14be36a666fabd32968b5f4dc481539d2372b526c1ead