Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/01/2025, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe
-
Size
487KB
-
MD5
082999121e0ee8c913fb8ad23de68aa6
-
SHA1
aae7f60516777fe3699b2a7e8a67daad9fe3385c
-
SHA256
ed527643f6289ab5ec7afe851288874d0b1ff2c412d7a16de8923ac20d59b1c1
-
SHA512
5b427e22d14d9a455422ac17c9540fadbe511d2fbe1a59076979faa57b034c727a4e0ca982ef0e453644fed0103638d742978830a9ef5949f16a614578c3a040
-
SSDEEP
12288:SCezCWumT7i5pMqn3OATDEFxp3MliP1mOmxF8I9jb:63u67OJOgDuyROO8I9jb
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2108-1-0x0000000000400000-0x000000000053C000-memory.dmp modiloader_stage2 behavioral1/memory/2108-7-0x0000000000400000-0x000000000053C000-memory.dmp modiloader_stage2 -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2108 JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2108 set thread context of 2400 2108 JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE082F21-D84A-11EF-BEB7-46BBF83CD43C} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443662048" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2400 2108 JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe 30 PID 2108 wrote to memory of 2400 2108 JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe 30 PID 2108 wrote to memory of 2400 2108 JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe 30 PID 2108 wrote to memory of 2400 2108 JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe 30 PID 2108 wrote to memory of 2400 2108 JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe 30 PID 2400 wrote to memory of 1736 2400 IEXPLORE.EXE 31 PID 2400 wrote to memory of 1736 2400 IEXPLORE.EXE 31 PID 2400 wrote to memory of 1736 2400 IEXPLORE.EXE 31 PID 2400 wrote to memory of 1736 2400 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a03f5ebd464d07cbc084268382e0a96
SHA1c620fe5216297a3f44cd288d8f376c8ccd566641
SHA25690fce1f3de6f3cd8504d6c0c679fae9e3a0fe6005df257737d40929c9637c607
SHA512aa4df1e32833eed11b848f8f42e482f9b70b4da84721324ca948ae5b642ff8e111c6e76f65496a825bca8d9c692e55498e1fc3700d80cbb2ba94f0f4bc267a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557108ea312ded9ccf9505ccdb7f12988
SHA18d915e12236e09433eb84a05fe21b381f704d494
SHA25676170a05373d9563e95a19b9682ba31c693bb3ab191504b6ecc46a6aa5899d8c
SHA512969e9afc8a389d4f96dc0d7e974800f3a6be0485a3453b9b9dd5205b039d1ec1c5bcaeeae81fda9e7b0ced3fb7d301542d3b8a717f6a06649f32836e54a0c33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ced0e235b447da60c21bf12a3086bb
SHA17a775286af6e76e9dc7687f2a6388993dc07dee5
SHA256adea1cdebb346aa2567aff26713dffaf7c1caa8770c2e71b95763bf50fa44f29
SHA512ecd11eae69fabcc1a4bee0fd79d4f19161d8ef16e234a8156694f9b763de5038131b1552dda382bc13043fa12f86f0dcce2c500394c06e2b195aad5950921500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796246918ab3bf0b14b592d87d44ef3f
SHA152e4eb53b25b1cef7537d93c7ac1d0a51618804a
SHA25680b6b874c430e415dbed81c8757682602be47b41a1fd3b7ea70285552588d5fe
SHA512697b8e3a0ff305972dd7af8439cfdef42005f7d8e1ab34e65c2d316ab0d9d5ad7a867464f802f4848092f54440a9df589461cb75c4f4e7ed30c26714e5445b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04ebf86465c567b8207b2f1e330f541
SHA108c33db85b4dc3e83bb6883ded5912b340295b80
SHA256f80a8914ae893f1ae5c0bf47d9f4cf8749e0fc1c10c9b68e5db52a679916781f
SHA5120d007c075b234ff28c6c0489a7ddf4267cc9966b1cbc5c3702bf77e9a26432f80faf382ae28a08a1c04b7cadf3ee2d1af2f0f4a3943bd2091e9b20a5c32c6f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525b016f20132bb558ee4f37a1864ab37
SHA12bcbbe1dd45e7fc730b0cbbe609e3104ae58911c
SHA256768c006eafb78af5e171ed5ab306507ddd857af19651abf8b38e3e83d61e2b0d
SHA512f30cedf2211046e9af3fc0a54e562d6311db9a8e0083676071342af6979a91f7fba1a9a66b0d0021e855640a3fd3b4c5370cfff0148dbe0df327e7edc2d62822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0eefbb80c7818900de59faf474b3be
SHA14b9528cd571727e7545787c58fd14b36dceecfa4
SHA256d167f193a94c969ad70e5b802058e877976301d2e593bb109c349d00d02b2f4a
SHA5121d9ee5bb73a747e44495f6401fefbdb65554efeac198ff20f86e2e217f54e35ac222a08fdd83b22c4ec9a705fd892d52d0bf287d3b2bc95e8651883ad909f51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc7e5d27b129ae2e85afdf66d8d7e4b
SHA1eb606716815a5d98a334817414fc3fd2196caddb
SHA2567f48f93b2cade1045cd30f5144f2003dcb8d2130ff0a195cd67f32c31f352762
SHA5124b8a241dcd48061edae570ed06e464f2089852bb643419514c70d0337c388cf7bccca4a260a0ec70e5464e326d663c232dfb7fbe79a2cb75ffeadbb510252038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a4ee08e95c2035fa30b9626b4810e55
SHA1b8b4afca1cddb59efbcd68c286d28a4c757c32bf
SHA2566d39ba29770de1045c304a5a60495f74bd6c358244b0f8f23300f629f12d5625
SHA512f7426b6ee5861c2f98b3e326a6721f825859288a85d4ef522fbbda22f55127c54efd04c9bed0a7571ce62f4ef00457e38aad4c7ce7bea581b31cebadf66db285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5965e2ba4d74916d359a02655864c4472
SHA1135cc2510f70b28456c36ba7b9907f79e862eef1
SHA256ea1cd20db4844ca72f20d77554e70e43de12c005ccecbcc83dd03ee80d804e71
SHA512a60e08f27e900178fbae07a4e95eb39d79b96e055690f524c788780a308869498c16bc99cfb7ec40ed4d16005591212e1e13efdcbcfb5a0059ec7a791d9e2484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992a3385ac6531b798994e71416ae1f7
SHA1d424151c99c0dbe3caf40f823baa514904944a64
SHA25668d3a4b504c47df10a84157a6b2655b39d3a2b69abd7a4f9b802783fedb157e7
SHA512ab3a31e7cd0d4a17d37692278d0167ce1d90ba1c470f845d06a9c1c596b7d7349bd077fb5bc3cafeaf9efb92bd6ca80ddd444fb3197983a4efcc83eb2b1b5d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f56eab79d5501d51d572f5e61d9613
SHA12ebd841f5813446579b1bd8ee048f81e5445b17b
SHA2564d84e9a28fd9ec1a2015daefeaa2a8a4976b3a13eeb28d9399dd477d3932b225
SHA512a7506c797b44db34b4a149d22f139cfd6ef4ac6306ca39c6b4262c293b64c202165e6eaa8e6a28bfe8f9522eef04ddd89e55944b73816e3cadac178618e83192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5372ab25bf16d4e3ebb87970e070059f6
SHA1876656a00935b3ac51e318e7adf0b2a46b2fa71e
SHA256926fa61013ae66876219829818468d00e945743c377e725b735704cfe19d8f57
SHA512b7521c49e4bd688625ac51e1004d3de4b9a8ae7e4044f4f10aa9bf0efe1e55dbae1d1d776733fe2ecb9364d734153f4adf8fe2300361729eb2a60feecddc5422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541933026afd0cd90cbe17737ce222687
SHA130fef79e84080106ba927d59111f5e5ea1767457
SHA2560aa42bfa1759b4556374ca5919437e24c6891f702c4ab505e36ed4b4ee9b282d
SHA512be4081e31e5d92d0979225b3e24fb942773d62853c9b966888c8085a62dd9fab92d81d3b4a021843d8724144e92c2f6d4eba56f5629a70844b5f230c259d9bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63dbe31216a9804aef6b812000fabcb
SHA18003873f7fd0253d8ca8e5cb885ea23413f941b0
SHA256cc6aef19b945f26dd1c42da5839f19b5c72233fcf9141394543fbf1d18ebd3e0
SHA5127c3f273bf10d492ff6a324bc196f7d55eaeb2cff223160b38bde05947a04239ce88463791fa57b5d103813af0e084b0e5ccff4bb46f21b451e68dd127d89c4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52190b9cbbeb2d6f340ae5e27ba1cbd
SHA158aa9c8193e003120b5c8de3ad776d41a5ffdde3
SHA256065ccb11001d4c6bbd4d94b6c36bf04d7c4f95c0f4eb8094cda79a9745298373
SHA5128aa5770c49699feadce92f6d2ceae6e7785fab2c69aab209212ea62f69d4b3b8dc9fe65c2fabdbbad8a701fe83b24af367b319244bb718c1b1d5231e3dac2e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b99cadb5cece914f1435fdefa731bac
SHA1738daaa2639ceefbec9e8b544f582729fac783bc
SHA25680a00946a3b5b4931189732933bddb36d538e405f905453b15bc2018061920ba
SHA51238a091aba28d0e9addc3cc15aa1380d99061970d0451762e72ae3933172865893741e759ec96ea9c4cc83365b54562feb006a8fa802772a251587af2a20c25fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ceb553ee5f894257131762711e3c56
SHA1ffdca6752fe31ef6580733a78e89b256ad90d141
SHA2567727c8a6df8323d72df6f26683eecd5f839fe9b55be079e416c3638a8f977a85
SHA512feaf2debdef4b5cbc6fc3fc63eb7e32aec91d6c35587397ceffe4d085cf19e829564a92078443424d50a52945b3c3fd225c64c20b7f948a6c832b5c65fafa806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8c0b779f78acafb83cfccb96a8dba1e
SHA1be9470299785faa4c0de7bb691250f8cc318f6bd
SHA25604ee09002790ed34eaba5abd49685f83247630b2ec6a9756e337ca5c1d89bd6a
SHA512138c1ff2d681336d4d25e6afdeb38f6e9068f88ba22e287af60d799b303e6139222ffd5ccc069d53844307e57883ba21c647544960ccdce70cc1729975217d2d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b