Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/01/2025, 22:56

General

  • Target

    JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe

  • Size

    487KB

  • MD5

    082999121e0ee8c913fb8ad23de68aa6

  • SHA1

    aae7f60516777fe3699b2a7e8a67daad9fe3385c

  • SHA256

    ed527643f6289ab5ec7afe851288874d0b1ff2c412d7a16de8923ac20d59b1c1

  • SHA512

    5b427e22d14d9a455422ac17c9540fadbe511d2fbe1a59076979faa57b034c727a4e0ca982ef0e453644fed0103638d742978830a9ef5949f16a614578c3a040

  • SSDEEP

    12288:SCezCWumT7i5pMqn3OATDEFxp3MliP1mOmxF8I9jb:63u67OJOgDuyROO8I9jb

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_082999121e0ee8c913fb8ad23de68aa6.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a03f5ebd464d07cbc084268382e0a96

    SHA1

    c620fe5216297a3f44cd288d8f376c8ccd566641

    SHA256

    90fce1f3de6f3cd8504d6c0c679fae9e3a0fe6005df257737d40929c9637c607

    SHA512

    aa4df1e32833eed11b848f8f42e482f9b70b4da84721324ca948ae5b642ff8e111c6e76f65496a825bca8d9c692e55498e1fc3700d80cbb2ba94f0f4bc267a58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57108ea312ded9ccf9505ccdb7f12988

    SHA1

    8d915e12236e09433eb84a05fe21b381f704d494

    SHA256

    76170a05373d9563e95a19b9682ba31c693bb3ab191504b6ecc46a6aa5899d8c

    SHA512

    969e9afc8a389d4f96dc0d7e974800f3a6be0485a3453b9b9dd5205b039d1ec1c5bcaeeae81fda9e7b0ced3fb7d301542d3b8a717f6a06649f32836e54a0c33c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17ced0e235b447da60c21bf12a3086bb

    SHA1

    7a775286af6e76e9dc7687f2a6388993dc07dee5

    SHA256

    adea1cdebb346aa2567aff26713dffaf7c1caa8770c2e71b95763bf50fa44f29

    SHA512

    ecd11eae69fabcc1a4bee0fd79d4f19161d8ef16e234a8156694f9b763de5038131b1552dda382bc13043fa12f86f0dcce2c500394c06e2b195aad5950921500

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    796246918ab3bf0b14b592d87d44ef3f

    SHA1

    52e4eb53b25b1cef7537d93c7ac1d0a51618804a

    SHA256

    80b6b874c430e415dbed81c8757682602be47b41a1fd3b7ea70285552588d5fe

    SHA512

    697b8e3a0ff305972dd7af8439cfdef42005f7d8e1ab34e65c2d316ab0d9d5ad7a867464f802f4848092f54440a9df589461cb75c4f4e7ed30c26714e5445b58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c04ebf86465c567b8207b2f1e330f541

    SHA1

    08c33db85b4dc3e83bb6883ded5912b340295b80

    SHA256

    f80a8914ae893f1ae5c0bf47d9f4cf8749e0fc1c10c9b68e5db52a679916781f

    SHA512

    0d007c075b234ff28c6c0489a7ddf4267cc9966b1cbc5c3702bf77e9a26432f80faf382ae28a08a1c04b7cadf3ee2d1af2f0f4a3943bd2091e9b20a5c32c6f6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25b016f20132bb558ee4f37a1864ab37

    SHA1

    2bcbbe1dd45e7fc730b0cbbe609e3104ae58911c

    SHA256

    768c006eafb78af5e171ed5ab306507ddd857af19651abf8b38e3e83d61e2b0d

    SHA512

    f30cedf2211046e9af3fc0a54e562d6311db9a8e0083676071342af6979a91f7fba1a9a66b0d0021e855640a3fd3b4c5370cfff0148dbe0df327e7edc2d62822

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb0eefbb80c7818900de59faf474b3be

    SHA1

    4b9528cd571727e7545787c58fd14b36dceecfa4

    SHA256

    d167f193a94c969ad70e5b802058e877976301d2e593bb109c349d00d02b2f4a

    SHA512

    1d9ee5bb73a747e44495f6401fefbdb65554efeac198ff20f86e2e217f54e35ac222a08fdd83b22c4ec9a705fd892d52d0bf287d3b2bc95e8651883ad909f51b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fc7e5d27b129ae2e85afdf66d8d7e4b

    SHA1

    eb606716815a5d98a334817414fc3fd2196caddb

    SHA256

    7f48f93b2cade1045cd30f5144f2003dcb8d2130ff0a195cd67f32c31f352762

    SHA512

    4b8a241dcd48061edae570ed06e464f2089852bb643419514c70d0337c388cf7bccca4a260a0ec70e5464e326d663c232dfb7fbe79a2cb75ffeadbb510252038

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a4ee08e95c2035fa30b9626b4810e55

    SHA1

    b8b4afca1cddb59efbcd68c286d28a4c757c32bf

    SHA256

    6d39ba29770de1045c304a5a60495f74bd6c358244b0f8f23300f629f12d5625

    SHA512

    f7426b6ee5861c2f98b3e326a6721f825859288a85d4ef522fbbda22f55127c54efd04c9bed0a7571ce62f4ef00457e38aad4c7ce7bea581b31cebadf66db285

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    965e2ba4d74916d359a02655864c4472

    SHA1

    135cc2510f70b28456c36ba7b9907f79e862eef1

    SHA256

    ea1cd20db4844ca72f20d77554e70e43de12c005ccecbcc83dd03ee80d804e71

    SHA512

    a60e08f27e900178fbae07a4e95eb39d79b96e055690f524c788780a308869498c16bc99cfb7ec40ed4d16005591212e1e13efdcbcfb5a0059ec7a791d9e2484

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    992a3385ac6531b798994e71416ae1f7

    SHA1

    d424151c99c0dbe3caf40f823baa514904944a64

    SHA256

    68d3a4b504c47df10a84157a6b2655b39d3a2b69abd7a4f9b802783fedb157e7

    SHA512

    ab3a31e7cd0d4a17d37692278d0167ce1d90ba1c470f845d06a9c1c596b7d7349bd077fb5bc3cafeaf9efb92bd6ca80ddd444fb3197983a4efcc83eb2b1b5d18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43f56eab79d5501d51d572f5e61d9613

    SHA1

    2ebd841f5813446579b1bd8ee048f81e5445b17b

    SHA256

    4d84e9a28fd9ec1a2015daefeaa2a8a4976b3a13eeb28d9399dd477d3932b225

    SHA512

    a7506c797b44db34b4a149d22f139cfd6ef4ac6306ca39c6b4262c293b64c202165e6eaa8e6a28bfe8f9522eef04ddd89e55944b73816e3cadac178618e83192

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    372ab25bf16d4e3ebb87970e070059f6

    SHA1

    876656a00935b3ac51e318e7adf0b2a46b2fa71e

    SHA256

    926fa61013ae66876219829818468d00e945743c377e725b735704cfe19d8f57

    SHA512

    b7521c49e4bd688625ac51e1004d3de4b9a8ae7e4044f4f10aa9bf0efe1e55dbae1d1d776733fe2ecb9364d734153f4adf8fe2300361729eb2a60feecddc5422

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41933026afd0cd90cbe17737ce222687

    SHA1

    30fef79e84080106ba927d59111f5e5ea1767457

    SHA256

    0aa42bfa1759b4556374ca5919437e24c6891f702c4ab505e36ed4b4ee9b282d

    SHA512

    be4081e31e5d92d0979225b3e24fb942773d62853c9b966888c8085a62dd9fab92d81d3b4a021843d8724144e92c2f6d4eba56f5629a70844b5f230c259d9bda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e63dbe31216a9804aef6b812000fabcb

    SHA1

    8003873f7fd0253d8ca8e5cb885ea23413f941b0

    SHA256

    cc6aef19b945f26dd1c42da5839f19b5c72233fcf9141394543fbf1d18ebd3e0

    SHA512

    7c3f273bf10d492ff6a324bc196f7d55eaeb2cff223160b38bde05947a04239ce88463791fa57b5d103813af0e084b0e5ccff4bb46f21b451e68dd127d89c4b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b52190b9cbbeb2d6f340ae5e27ba1cbd

    SHA1

    58aa9c8193e003120b5c8de3ad776d41a5ffdde3

    SHA256

    065ccb11001d4c6bbd4d94b6c36bf04d7c4f95c0f4eb8094cda79a9745298373

    SHA512

    8aa5770c49699feadce92f6d2ceae6e7785fab2c69aab209212ea62f69d4b3b8dc9fe65c2fabdbbad8a701fe83b24af367b319244bb718c1b1d5231e3dac2e9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b99cadb5cece914f1435fdefa731bac

    SHA1

    738daaa2639ceefbec9e8b544f582729fac783bc

    SHA256

    80a00946a3b5b4931189732933bddb36d538e405f905453b15bc2018061920ba

    SHA512

    38a091aba28d0e9addc3cc15aa1380d99061970d0451762e72ae3933172865893741e759ec96ea9c4cc83365b54562feb006a8fa802772a251587af2a20c25fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6ceb553ee5f894257131762711e3c56

    SHA1

    ffdca6752fe31ef6580733a78e89b256ad90d141

    SHA256

    7727c8a6df8323d72df6f26683eecd5f839fe9b55be079e416c3638a8f977a85

    SHA512

    feaf2debdef4b5cbc6fc3fc63eb7e32aec91d6c35587397ceffe4d085cf19e829564a92078443424d50a52945b3c3fd225c64c20b7f948a6c832b5c65fafa806

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8c0b779f78acafb83cfccb96a8dba1e

    SHA1

    be9470299785faa4c0de7bb691250f8cc318f6bd

    SHA256

    04ee09002790ed34eaba5abd49685f83247630b2ec6a9756e337ca5c1d89bd6a

    SHA512

    138c1ff2d681336d4d25e6afdeb38f6e9068f88ba22e287af60d799b303e6139222ffd5ccc069d53844307e57883ba21c647544960ccdce70cc1729975217d2d

  • C:\Users\Admin\AppData\Local\Temp\CabC830.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC90F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2108-1-0x0000000000400000-0x000000000053C000-memory.dmp

    Filesize

    1.2MB

  • memory/2108-0-0x0000000000400000-0x000000000053C000-memory.dmp

    Filesize

    1.2MB

  • memory/2108-4-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2108-7-0x0000000000400000-0x000000000053C000-memory.dmp

    Filesize

    1.2MB

  • memory/2400-6-0x00000000001F0000-0x000000000032C000-memory.dmp

    Filesize

    1.2MB