Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/01/2025, 03:09 UTC

General

  • Target

    JaffaCakes118_09d0c0da9328b1b778e33d52f2cf1c3b.exe

  • Size

    395KB

  • MD5

    09d0c0da9328b1b778e33d52f2cf1c3b

  • SHA1

    ab9a319f523b0be50c9667bc077cf731a2959a4a

  • SHA256

    32f4e884ebf3f811430335b30c28d9a3277756b19674412297d94f56be22eb3d

  • SHA512

    660215941bed43c83aee35250095dcb7849e3e6280968f9cb536ee30cdeb68f98de2b537d3e453948f167400aa10e35aef75788f6ca24627097a4019c42185d5

  • SSDEEP

    6144:5PipyF/T1QIUc6rCxuIyAmmkNibIvLy2zHL0seUzFDUSxcZ2WYEJqjdrnogjMKY:kpyZT1mrCxu/mDwLRI6BxcDqp9Y

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09d0c0da9328b1b778e33d52f2cf1c3b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09d0c0da9328b1b778e33d52f2cf1c3b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09d0c0da9328b1b778e33d52f2cf1c3b.exe
      JaffaCakes118_09d0c0da9328b1b778e33d52f2cf1c3b.exe
      2⤵
        PID:2716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 144
        2⤵
        • Program crash
        PID:2764

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2404-0-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2404-1-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.