Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22/01/2025, 04:51

General

  • Target

    JaffaCakes118_0a81bbc1b83330d03d760374094a599e.exe

  • Size

    1.8MB

  • MD5

    0a81bbc1b83330d03d760374094a599e

  • SHA1

    47747c41fee807b80a437166cf9323c517d0cafd

  • SHA256

    da2ba3a6cd9a50e7461aa622fb92d0a5623e6d1a8be3e5d16aed1eabcb3e3d24

  • SHA512

    d2cfcc57e18936a0ee95dd68bd64b97621c49d6a46507ab77a4eff387b8dffb0b8acacd8754fbcbb486e20fbe09265ba7776b920c755fb47df464213e0702bdc

  • SSDEEP

    49152:sY4p8Pt10/v65JrFXFarp9M0EnUH0/PdyGy8kRALLcduYZ:sY4p8FaH65Jf4aUU/PHy8kRiAdT

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 12 IoCs
  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a81bbc1b83330d03d760374094a599e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a81bbc1b83330d03d760374094a599e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MAYSEX~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MAYSEX~1.EXE
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Users\Admin\AppData\Local\Temp\222.exe
        "C:\Users\Admin\AppData\Local\Temp\222.exe"
        3⤵
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Program Files\Internet Explorer\iexplore.exe
          C:\Windows\system32\server.exe
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2960
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2996
      • C:\Users\Admin\AppData\Local\Temp\erver.exe
        "C:\Users\Admin\AppData\Local\Temp\erver.exe"
        3⤵
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 436
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cb40ca374fdcf3314b2b79482577240

    SHA1

    bfd146b7250456f44ff33bd93ef5844ebbe8fd7c

    SHA256

    39249b5b84e4f35684d883ed442e95278bdfd06a6494056e4eb19e0993f6c356

    SHA512

    4a83b3571369243bcb816c303f1c3646e5a6dbcf307c78ecc11b028612afcfcf23c4641dffcb6cfb35882b6563883ee80b6987d12a2d4e709e6e0f580446cd9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4ef8d19b7255f57ea6ceae8ddd57aad

    SHA1

    0dddf0eec3ed3ce9e8ddef4aaa597d53ca8d8bce

    SHA256

    505b7c99795212cca1d8725044123d42519881e83c44a3c6475bc617babd485d

    SHA512

    5bae37a39be2f0d1ff0c86c4a2d17fd9a3f8eadf2570e9c2cff39734506f0ca5dd85c595e296017d7c7e5870e9d02febe7cd40dde841fc58192552b2f8964c2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3c875d0574d07134c9bf0a0bd0d1967

    SHA1

    7eabbeb71abea350c5c2d50da7b7376bf91f2810

    SHA256

    826100bb8c4481ab05616527929bb0c33020eec03f12ab0d608b6f41e33ff7ad

    SHA512

    02f76fdb4a64fc59cc81a7453ae75239cf76ccc0e0a4658dd4cb377e9ac4efffa3f7ee12a3b2ec94039c645f45f2560f36b457b1b91080559b821f8e08f08be7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85937c5cd66ac254f0e8e4f1b0e358d9

    SHA1

    92fc7ab796642d5d72b802a2473fff21041fac5b

    SHA256

    b06a2fb942fec4c715581b9f0950ec1a7f2db75aeac86cf8bdcb1a5e6f6a2b58

    SHA512

    e98f79a47af1eb5f31691452b43806704b6f309c5760e3d8535da50ef37e1940848fcc836b7b97eb97ca7b8df71b1a51f058300b3323e08dd0742dc453c61e75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e62a85076e715793a83abe73bb82be63

    SHA1

    0d06b9419551ee1192f92bb4d0d63724e1d02558

    SHA256

    309098f9dd653f95a287e91d47e47b748d1b58413311f2afc2003143ae678222

    SHA512

    53d223352d2b3e71afdd97a5a9d46ba7bfc36d0ce443acfe26c0020006143aca72aa3f3581a5c5dccc190e66a66248772c4c2302f310d0bf69427e70e079bbdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4001735d7519579dd13695f76993748

    SHA1

    3282d7b41f66af2955e752ce709173b636eef27d

    SHA256

    dcf7f8983366b203439b96920cb3793c111e02ba276af3b727d69dfe1bf7eefc

    SHA512

    a5368b372c51b833652c818a1493fe90267acd9c114012b2ed3e60bb25018b3a40656b101a8ffcce2f7afabd3b0871cc99efbee0bd9fc694c5eb741a46a83738

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c494c735843e1741efb0b15978f96ea0

    SHA1

    f7a13a04d38e0252f2454e4f87a48d46838d8da3

    SHA256

    bad8c8ab5b78044c5df7f9638ac7e583caacdea23b9d2dfa5de685a77334bba6

    SHA512

    4bc30d8e250efae059016027253602901c0cdd5e113be1f36443a5533521ba3fbcffde951be44653e2a31c32150084d35811563d9d425a701f5aa871b872043e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6299a701885b992783ca7f21750e77eb

    SHA1

    4e2789e5e18322aab3438dcef80177674f2e2607

    SHA256

    67431fdb18343128dc09882aa8d3d06fbd1438f69e74beb27bc2a1d9a4e33ecc

    SHA512

    8369e966c5aeeb5e572ecdbe4a0ebfb38b7e535fc8c47ac5d59719e2e3428a5452f0c06d57b1dcf56e6c13c9eaa1421fe1815edae8e360c50500310f5e0bd67a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2deb3493445904b248465b11aedb757

    SHA1

    70e1a86a05430a97c0bad82ceb10c096f848ca14

    SHA256

    552541c04f2f0729fda7265fbe8546529cc68005ec0e903d0ee0050e7d1e0e3f

    SHA512

    cdfbbe970e302ef815c3d184a56b17352a5ddeb071b0da1a7223d4b4411f313c1e903fce62fe3b955580d73a26c8055c5f41d25f8c5a0d77ced77f393ea66785

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9a8e2a90de6ffe4362c6b9290146ddf

    SHA1

    6f14b2ed2b8b3e9957e9c610017d139fc46dbe0f

    SHA256

    258a53ae7ae96df9047c5d1a67a541b06b591aaacf80495f719fb9a101fdfd1e

    SHA512

    2179bd97ace9a7e8cea03a6c6be1282356025811acbcd7ea587520102fadd357799c6956d6c74c509fb59da0948b4043a3a05d1299a457c03320fce4fbb472bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6a19e3d43a3befd64097a5730548aab

    SHA1

    4eeec5c5b2152fb9b1e6948d54af591c27230428

    SHA256

    93c05be6aaffa25c465b28bcf84db0cac06d207f78c12f755f94d3e1f7a3de12

    SHA512

    15f81f31fdc21fb2566b18a210215b11237d58ddf8e4f02d7b9bb39e8d3f5ad253f365acc4b92d67e465ba432d04ebc82586ff6b022536c61442aabf68d87ff1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f5a69590b775611f6f14a8b205032b0

    SHA1

    15d529cdee0af7859261d992f266d6a543468d50

    SHA256

    8ea5117ce5b53ab30eb8887c645d6e41b5cec7897ed182a7ce13af18068da0db

    SHA512

    4486a7f3324c49e639d4b8327235b6801901f64971c181ef7ab105d353c483aac79a497cadadc8c43131ea77ac1f57d0bbaff8af1c0c247ac871dbbb5fdbfd4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00d34150440045ec07f1155a74ed959f

    SHA1

    6836bd1f974d998f793b78d34eb034d895732ff8

    SHA256

    a38a3ed79959e7bb70543b2d75c9e23b5f51cc0471bdcf455b40260159d54d36

    SHA512

    eaab4c5ece205869047a80445cd867e50e4dfb2f1ded987f959685bc41c0805c304d876994b29c238f486b457117c6678d86abe5bdd6ba9d3d33c6fdb5078fa7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03b88602bb869f4cb160dae9921e8e23

    SHA1

    c9b2d124393f7460ee7f3d5f5237371ea06d3d12

    SHA256

    f255ab7820046a1f2da81b80d0451ac8fb25df6593b6ab2799d51cf418158576

    SHA512

    bf22fdfc095a10924d294e3bcb9de1192b97bad9fc8bf335c11aa7bd645de7e48e084214cbbc69c96563c943151f20c838651bf5c71fc1908a1f70b20c28d46b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc3c4930b31625b13956276fdf44e498

    SHA1

    38bfac42e14959e3426c87acd1ff55e0075f0a7e

    SHA256

    1c940524617f103ea8ee81655f6f7e0290550f516f4bb36de9376ef65ab2710d

    SHA512

    d03a4a9ad1c4a3d0abf44416f3227f225faefe6f43a3b154fbc523af20b8185c113530e63d5eaa6e2f592554b7bb02e35b11fea03bf137f7fa5638b876ff9aa5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afc8e2c4647a6a9875092cff8c6683a4

    SHA1

    df9ed132b1b58439d90f3c35d03c26ed1fd88e4d

    SHA256

    610eecf9a94183772c8b7f71d8e8cff588a73023a88b2b492830e39f2eb51515

    SHA512

    4599907301c25147a931f381fef1fe0fb5e4b93dfa386297fcad56b5118483afee9ff5bbd44d2664cd7eefbaf1c20cb75204543db6ac5fc1e961b770ed560e56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26b62384c482c050ca521f33b112475e

    SHA1

    5cb6536a011628ee6b23de5d0b98731f2e9e57b3

    SHA256

    e203cdf6c02be9a852e41895ff459198fd59cae5c3d5abb34c92edd37f88f526

    SHA512

    e15c4109a8a62f647891ba7239f3177a73017848ccfa1224809e6b2576075b028c7e52bebfd2cf520cf15cdac0eeee786768696d617e8f563f60d6aa30f4b7c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11d183eb651d1b3c40b41f766e25b4be

    SHA1

    4167d42e2c41d0cdd5b7d883d275481560683a6b

    SHA256

    5e21c9c34a49b9749b12a25b7ead5432cbdadc081ea3f0eb551cc276dc6c31c1

    SHA512

    a0126bad4cfc2b3798b0cf49945002303be4bc909edce17629fe839a8d2f317820962172ff1f0753e59b5526d210ddbadca3ccb5efd15d48f21ab83a6e99bf05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d87e90307ad60f3dbe6518a14f1c84d8

    SHA1

    99696e91a8e0417a6598a6873f82f45864f195f9

    SHA256

    a4efad045931f859f0940dac2284c2cd276d46abdc2ca4199770636c4f366172

    SHA512

    d02341fe97b51ff9706fcab09028667d77493a47d8097b275d1149617afa647797ef4cabbbd66895081a786d318e06e458f2adb9b45987db3ac02ac851d7ddba

  • C:\Users\Admin\AppData\Local\Temp\CabFC0E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFC7E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\erver.exe

    Filesize

    972KB

    MD5

    fd955cd7786fe3aed61a4134896c627c

    SHA1

    c5ef19cd27be82fe4bed06162915465a17010c93

    SHA256

    c4f957f6796254023de7be4c8a9da49149c80bb397bc772bfcbf11f4857c36c2

    SHA512

    480b28aa119603b4d731081c5af9227dbdf90c2c8dd1d9201e4e2f5e0d5f6bc7d5264cc594d42a6920189c781add185c1db77b987272f9b02a09f37e5271852c

  • \Users\Admin\AppData\Local\Temp\222.exe

    Filesize

    747KB

    MD5

    5327d27a50687a818a0f422775332694

    SHA1

    074d4a74b165a1beb3584d58878ca4716b86ccd3

    SHA256

    de4c99afed13046fdb3cf968302ddd3156433320caf90c9803eb82cf339b93d1

    SHA512

    d4a9daa5d71464f3a19e51012ffff4f7b8bceb0411b3a48fb3aff9e82118e451114553512e75c6c08886db92acb4d311f9d5181e173c4a43da8d0822c0a8656b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\MAYSEX~1.EXE

    Filesize

    2.0MB

    MD5

    5d11d735caa85b42fa2da1b025895116

    SHA1

    997277fb62d4cf2474db0dd8628c252f362ab39b

    SHA256

    78559dd5bde582dd2c50bb53edcd39c277c0369148664bb55d8061defa4e53a8

    SHA512

    901db32c83f00f2cc221670b928b48a47eef23347489fb9113108da986d47a0050edea15e8db8f76f07343e983da1139b63754dcaa805cf59a45612eb33ad13d

  • memory/1644-41-0x0000000000400000-0x0000000000661000-memory.dmp

    Filesize

    2.4MB

  • memory/1644-15-0x0000000000401000-0x0000000000409000-memory.dmp

    Filesize

    32KB

  • memory/1644-42-0x0000000000401000-0x0000000000409000-memory.dmp

    Filesize

    32KB

  • memory/1644-13-0x0000000000400000-0x0000000000661000-memory.dmp

    Filesize

    2.4MB

  • memory/1644-24-0x0000000010000000-0x00000000100BF000-memory.dmp

    Filesize

    764KB

  • memory/1644-25-0x0000000010000000-0x00000000100BF000-memory.dmp

    Filesize

    764KB

  • memory/1644-14-0x0000000000C30000-0x0000000000E91000-memory.dmp

    Filesize

    2.4MB

  • memory/2284-8-0x00000000038F0000-0x0000000003B51000-memory.dmp

    Filesize

    2.4MB

  • memory/2284-9-0x00000000038F0000-0x0000000003B51000-memory.dmp

    Filesize

    2.4MB

  • memory/2628-46-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/2628-55-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/2628-45-0x0000000000940000-0x0000000000A32000-memory.dmp

    Filesize

    968KB

  • memory/2888-27-0x0000000010000000-0x00000000100BF000-memory.dmp

    Filesize

    764KB

  • memory/2888-30-0x00000000008B0000-0x000000000096F000-memory.dmp

    Filesize

    764KB

  • memory/2888-51-0x0000000010000000-0x00000000100BF000-memory.dmp

    Filesize

    764KB

  • memory/2960-49-0x0000000010000000-0x00000000100BF000-memory.dmp

    Filesize

    764KB