Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/12/2024, 07:30

General

  • Target

    faa338eaef84edfb0c71bee5f5f82d82_JaffaCakes118.exe

  • Size

    703KB

  • MD5

    faa338eaef84edfb0c71bee5f5f82d82

  • SHA1

    b7a4fbe50702ef865de819175e2b4907ec29ba3e

  • SHA256

    1a1ec78315d321cea9e2108a265465d8b8d6fb79d815228438610570c5f3a6c2

  • SHA512

    f94d76b7f98c9dd7ddc39e2e9c20058917c7b888cb7eca6dc898e9408d7ee95488cba94a2d42a60db41598ce27b99b3fa94df75514179c80546aa8b86155118e

  • SSDEEP

    12288:4c//////dUAxwKc7P9Lp5soXMVGLFwgzXJVgQxHpVPClcyrT8mxj8msxeJD7a+Qi:4c//////dGqduCgzXTdpVycyrJ8zAJDn

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\faa338eaef84edfb0c71bee5f5f82d82_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\faa338eaef84edfb0c71bee5f5f82d82_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\faa338eaef84edfb0c71bee5f5f82d82_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\faa338eaef84edfb0c71bee5f5f82d82_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db1d1ef01ad28ebfbdc0e4b3f4dc24b8

    SHA1

    aec7987706428eeac2d77d08dbb5574d467494cd

    SHA256

    8c9157bd493cd8a42c45a84d01d2c0b02f6257019ac56383e73cb8d82de8e0ff

    SHA512

    1a94bc8b353ebeb81f0a30a3f5388e0686fd5448ca5140a157910ea9ae17c6662a6b57d433c52765bb076b9b89cf83dc05f474d8c3fb1a7c5e9d44c4022c2f87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9965180865bda195861990bf836c076

    SHA1

    c2146ce4671209f764dd4b3f78d820a021ea0f39

    SHA256

    461a48ad71cc785ea54388b8ad5a9735e5bfb65b6bc7f2cbbaaa38ea94a06b5f

    SHA512

    aa7439efb0a8ed921bf231dff16182ab9b75ba6db7491d95aaf766e570eb6db13a893bceaa2e3865e850b884b3be983e04a4753d8a8ef94bb1337604e01d95bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4425591001054fc251b80fcfe6697bc0

    SHA1

    7ac1a8eed1e9a8ff6f9fa310cc4d3ba80e737510

    SHA256

    ff76aaf5583f2e8d7be01b256b1badf62c1183f84592db3867728cc910777dc1

    SHA512

    34adba7313edb08180adf34ca977cf5825353931199336806384a4ddb0aa2070d14a096fb770131e9ad8a5266e5a570b267e8616bfbd093a910ef4923eb77ed2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3905ec4dd3c64874a31e93f84e1e7504

    SHA1

    8b98645031c57c139ed7cf24da330ab0972225f8

    SHA256

    ea053eeec39a61b8774f8223798a7ca6dfbb73ce00be8a8b06749bbe6463c8bc

    SHA512

    2f6ad816a8183727ab0322d34e3ee897f7ea7eb4c64d8b02964eabdf7407d3463243088938bd5e7788843e52b3a35ed8d29354e8c66fae08d0012b309de7bb93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eee36955ee399ca2c6a3e104086feb3e

    SHA1

    da725409bdd7f2b734dfc3ef984a42d3dd59b9c2

    SHA256

    2d43c7e5620606a9d754faf5d02f74fc715aa374cc012ea57de89941bc979f40

    SHA512

    4dd17b021a688e45dda13c6871d2d3caa699b880f3b73c1f3703785a1959da7d69269a1e0ef2008e444de528ea09fb7fa00966f33bd08fa5ca76ec8ed5a81f9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    436437a2a59c1dffc57ed439a836b1c2

    SHA1

    b62bb9603151d8bf6c6104ec443f7b425a7bfa53

    SHA256

    5810e60c05733d4cd023f7dfb3c5f771418960481576b0ecb42d6c7c6c9b8037

    SHA512

    929ceb4458c5fd9c8467012df3a5d55e710b6be11debe2b9b3931361ebd4d49468a348cbef68e0ee04e190bf0bb190b37e39ac382c30cb9c31d52ef4d4ff3db0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55b94ccffe708c436fbc4acfc2d29ef8

    SHA1

    e5d4b5215bb8bfefd1e5f7f2f79475a1e8060748

    SHA256

    a6fa2c4c6a9763fb9ebcf5237c90264e0e59ed462ab41a6f3c543fd718c40efa

    SHA512

    2d612c45143275083269424efe6ef75b5519d7963cfc096db5938de48a24396aa9351006b4aa4499223bfc1e82e8a81011396f3af01be853a1f98b51f01f5bf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    941731704863b77035bce3214680994d

    SHA1

    34f801bde6f1ed6e908aba694268db43c004c754

    SHA256

    9cbf4c24f23421bc396f72a604ce6dd758b6f7b18731ec4dda249a547ca39bfa

    SHA512

    b9844494b9066bb0122245f0881bba2304b6b3b7f38c062b63a805dc48f9f00c9b21bcacc25a2046228f26c2d241c739e673125aec35a3e1402aad855f3b2be1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92c9fc779d77393bc91e83d7b438c422

    SHA1

    30538adc74c816fb20fe709fa86ec44e1d0f42d7

    SHA256

    29d5cb0811d424db4db98f639da8361738e0db9c47c1375c679e8d6e9fa5aa6b

    SHA512

    ea443a0c81fccb0b467c824ade83854ac120f990c004b8c570432f94fd4139d1dbdad201f2b934714bdd6f8ac6170950012ae01a597424e0df5064a06a8a10dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7530aceba32ac12e6817423342b3dacc

    SHA1

    77c8882ca449551b1f65718ca36e0492e2ec35e5

    SHA256

    9b7135586aad2f1a72080cd6d094c430e26143a59bd0deec5c12dc5da4c06fd1

    SHA512

    d73aed66d2986f8692d97ca11135e88657645bcfa71a51556cf7c7fb3093d3f76366dce9a71f363963c8e253d36ad3a6c1f19c8cee8e04d609e5693fa8d862b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b8deece560ba7ff40548af897289bfd

    SHA1

    e244650f34474c70fa1e43bb7a222988e3f35cbc

    SHA256

    535b64ca9691034ec6bfdd21af86b696fb7d922b390f7a085b8e0c2e939c6c19

    SHA512

    a500996ff8e556aa731cdf3304ccc2937dd495016d706a1c9f9b2d07b9cd9ab81290be2945abe8f4b3dd722553f7cc3cff42057c283c484fe01327cede385f02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ddcbcd53d0ed743bc4c5c884c4bfc0a

    SHA1

    54c33972b73a7fd324dca61c13a8e2b35fa68501

    SHA256

    488704df7c0243337ace704d3369d51ec1b1bc50c2e9f2c19fed77f592b7dca2

    SHA512

    048c65dfd4b330f1580b253954306f2aa93223537368f14f8af3229493882595c975d0cbbc89f056b747159b4ba0624de0c9614ea6b3b14a2302c0ebe79cfaab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5913b959e6c0461a8e761671db4cdc77

    SHA1

    7e169b898fb3c330bbce8a092734b4e9544ab02c

    SHA256

    cbd94c267152b16d24b3358c0130fb4ee2686f1144a7fe7a1a4226befa4c46f3

    SHA512

    232dd78ae49d2a989098ba3ab299b3ee4a3498a8660ee9389fb8469d201b5dc6827d52bdc38ce9af0953cc11f1a354262ef4771b7e96e98674504953ffa5165c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a0b7b058306f455785b5c5c22be6acc

    SHA1

    d70adbd5d7c9d946aa7b9c7d433d49ba5152f1e2

    SHA256

    90c070bca9ed22d89922adc52abef3ba3f1043c73ddfd9f87e97f153ef21c2bd

    SHA512

    972b894be343408fc6a20a928eccb39476215b16a26a846989b104f1b8181abe8a88b2cf4b36535024e2455014a3f080767850b5a24a8feb989ecd6f50cf3043

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58c125954a816be48bd0bdaa1894ce30

    SHA1

    7211efd3141c4bd0ae8f3f3193154f02f6d865bf

    SHA256

    3d4a908a0141a4c490cee40a301dfcba262483498d42788fe0e4e901897f91e6

    SHA512

    9341029bab8acf7e367b34926f878458967640497c88e5e7df907dba4afb2a378a746da6edc3c9da46ccbaee606b9e18dc0ec32cabe25b4cde4f4acd2858e284

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    162aac14c859b189f3a0d722356f6f64

    SHA1

    25aa7e1ebb3350b4a9ecb901f32cb35985134556

    SHA256

    6a7b459c28ffb9a995b2cdbab7c54785d9d50520c235e4fe26fd1d95f3d27aa0

    SHA512

    403e98bfce2341951caf9dba5403181702055786a9bd188a313316eb6735081e6a5bc2483c996e6480ad45803e96cad747da2b61914a9b5fd1294a3dc0018069

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd0d4642eb3dcb1551bd0b38926db5fe

    SHA1

    ae8eba1fb5ceba38dbb0a3e8afbb85b2b49a3cc8

    SHA256

    abd072e483b2842af747c5bb34eb1a5668e334a5d70a56f6805072f6b985ce1e

    SHA512

    da7f2fc1671b6140412948f1198681dac99bea97b041db490a4a30da51981d2416611f27f6da256072f2407e48bc52007c6935ac848e88d50f5938f015a904d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfb00463543df49e6d2ddb3be52de7b9

    SHA1

    f680b329ccd89f73bb422324f4b538aefdd9da53

    SHA256

    66717090f7a79c3aa81033831d7962a0acbb21b40cf92ad2748634ee1f67d2fe

    SHA512

    6571d4d731ced8bfc9f953b248be726d2eccdc7769a446eac05211caee4436210e6b2bff81f3b9f275ce40ba0381bd10f7912087a51c06cae8882d71e44993a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c2ff609136cdf9fd42c6bf195d1ed19

    SHA1

    9fd62549b604960b9f316798b6dafa7df4dea8c1

    SHA256

    69d976450b8b14017992bf01ab7a5df654d5ce676e062e3ab90a7c1f980e5960

    SHA512

    722e88b632ba52bce8e06578897e483782854db4cfb7d2ee7cee76bba30fe8474d5a67e7fda838d04627a0f8849a72af7a6604f5a424eec437b06d91ee9a7624

  • C:\Users\Admin\AppData\Local\Temp\CabEE75.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEEF7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2060-12-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2060-2-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2060-4-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2060-354-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2060-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2060-7-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2060-9-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2060-15-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2060-8-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2196-11-0x0000000000160000-0x0000000000216000-memory.dmp

    Filesize

    728KB

  • memory/2236-5-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB