Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
e190a7571525225f5aaec174a6916cd7
-
SHA1
678605de0a818a07db99e05b8a1ca7b2ca556885
-
SHA256
d5d683788eabf84874a452a871a5fc382f5130297470824024033d8179cd12f3
-
SHA512
8d39a26aa1947b555e9f4c59638325e11dbfa113dd79f8d2c45972c90ddc3f14899b7686e86deafb2880a6f77513f0cc0f32b60e2bd28859d2f41395ac3c03ad
-
SSDEEP
24576:14U2UtzZzfQ2wS6nIZnIQ45KDco5MZEag/:C7KzfQ2Omnn45KAo1aI
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 18 IoCs
resource yara_rule behavioral1/memory/2816-35-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2816-44-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-54-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-53-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-60-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-63-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-66-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-69-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-72-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-76-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-79-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-82-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-85-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-88-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-91-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-94-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-97-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/684-100-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
Executes dropped EXE 5 IoCs
pid Process 1732 DISCON~1.EXE 2004 svhost.exe 2816 svhost.exe 2996 mstwain32.exe 684 mstwain32.exe -
Loads dropped DLL 5 IoCs
pid Process 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 2004 svhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2004 set thread context of 2816 2004 svhost.exe 32 PID 2996 set thread context of 684 2996 mstwain32.exe 37 -
resource yara_rule behavioral1/memory/1732-13-0x00000000003E0000-0x00000000003F1000-memory.dmp upx behavioral1/memory/1732-12-0x00000000003E0000-0x00000000003F1000-memory.dmp upx behavioral1/memory/1732-11-0x00000000003E0000-0x00000000003F1000-memory.dmp upx behavioral1/memory/1732-14-0x00000000003E0000-0x00000000003F1000-memory.dmp upx behavioral1/memory/1732-15-0x00000000003E0000-0x00000000003F1000-memory.dmp upx behavioral1/memory/2816-30-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2816-34-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2816-35-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2816-44-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-54-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-53-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-52-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-60-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-63-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-66-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-69-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-72-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-76-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-79-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-82-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-85-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-88-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-91-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-94-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-97-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/684-100-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mstwain32.exe svhost.exe File opened for modification C:\Windows\mstwain32.exe mstwain32.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe File created C:\Windows\mstwain32.exe svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstwain32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DISCON~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstwain32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2816 svhost.exe Token: SeBackupPrivilege 2804 vssvc.exe Token: SeRestorePrivilege 2804 vssvc.exe Token: SeAuditPrivilege 2804 vssvc.exe Token: SeDebugPrivilege 684 mstwain32.exe Token: SeDebugPrivilege 684 mstwain32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2004 svhost.exe 2996 mstwain32.exe 684 mstwain32.exe 684 mstwain32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1732 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1732 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1732 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1732 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2004 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2004 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2004 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2004 2396 e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe 31 PID 2004 wrote to memory of 2816 2004 svhost.exe 32 PID 2004 wrote to memory of 2816 2004 svhost.exe 32 PID 2004 wrote to memory of 2816 2004 svhost.exe 32 PID 2004 wrote to memory of 2816 2004 svhost.exe 32 PID 2004 wrote to memory of 2816 2004 svhost.exe 32 PID 2004 wrote to memory of 2816 2004 svhost.exe 32 PID 2004 wrote to memory of 2816 2004 svhost.exe 32 PID 2004 wrote to memory of 2816 2004 svhost.exe 32 PID 2004 wrote to memory of 2816 2004 svhost.exe 32 PID 2816 wrote to memory of 2996 2816 svhost.exe 36 PID 2816 wrote to memory of 2996 2816 svhost.exe 36 PID 2816 wrote to memory of 2996 2816 svhost.exe 36 PID 2816 wrote to memory of 2996 2816 svhost.exe 36 PID 2996 wrote to memory of 684 2996 mstwain32.exe 37 PID 2996 wrote to memory of 684 2996 mstwain32.exe 37 PID 2996 wrote to memory of 684 2996 mstwain32.exe 37 PID 2996 wrote to memory of 684 2996 mstwain32.exe 37 PID 2996 wrote to memory of 684 2996 mstwain32.exe 37 PID 2996 wrote to memory of 684 2996 mstwain32.exe 37 PID 2996 wrote to memory of 684 2996 mstwain32.exe 37 PID 2996 wrote to memory of 684 2996 mstwain32.exe 37 PID 2996 wrote to memory of 684 2996 mstwain32.exe 37 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e190a7571525225f5aaec174a6916cd7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DISCON~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DISCON~1.EXE2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svhost.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svhost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svhost.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svhost.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe"5⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:684
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2804
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3533259084-2542256011-65585152-1000\02fc8fb78d4f7516019d9a99eaf6a46d_38b42d9b-3e83-45f4-8789-a30be34574b0
Filesize50B
MD50d07aceef41f39fddc179b4cee5a6143
SHA18dc81dd6d1f4a8d2cd06a374ed2504aa087761b8
SHA256ae030038639228088c0ffd198200efad2f7f69f2ff909414ad2dbb6331d9a265
SHA5120fcb788f2122ee8101dfbbbffc55960a1df4e4b3054c0803ac0b2dc244fd28018951c874700c6d5d7a7433d301c860d44db1a24761b0c53b68e18df0c81caade
-
Filesize
1.1MB
MD575b1a103d1a2a22a5ae9f98724413343
SHA1401584cce812dd3b3a98119f1cd6d812c6b3c4d1
SHA2561341d029cd2c230ff5cc6c4fc887c28c2ca4ed96f044b414bf0f07ae6b0045ac
SHA5126d8e8b58ce628d58aa147ee5ace61a84d36d82f08f6d128d1c5bf6e261526832ecea4717d485cd387819b0e50ddce1fb98d005743a1f652cca95f28e830d3659
-
Filesize
266KB
MD5b8e97b0f995b7af092861ab1af74e636
SHA1bcedfc6ab9e24e4abe43635b8927712122c6c5d7
SHA25695ee9d434c8c9a42b546f29934a1cc4552a44f05528458293e5cb6e474ea4042
SHA512077aeb62ac10d2fba40267acc7e5ccac92029e313ae76b92263cc6e592c93f3944fd10bcd19b733e7dc3a44f898381de33db44b89a0e762ec611668013afa375