Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2025, 13:17

General

  • Target

    JaffaCakes118_0dfcf96a5bf4b57adca7f7b7be626f64.exe

  • Size

    333KB

  • MD5

    0dfcf96a5bf4b57adca7f7b7be626f64

  • SHA1

    b29e5f05ac7608c012ac1e1fc58f7c0b80d1f2de

  • SHA256

    f49b9da3a0a6e7c7821c4ace1529ece8917124037295240503f51e17db789fe5

  • SHA512

    ffc0638ae0dc0bd9255528c583cacfdb77a6d9391df852587ac10629d41b24c4cea837f78cc37a76fba1165e0f7ff44a38a14a7c818db914d43014d82d39f752

  • SSDEEP

    3072:v0lMPUmWwL20OKsfdk8FnWZ4ufMXjFWT8i1Rw+x3psL4ISZSm/6YUWafcy9K0Rbs:0MPhWwy0PeKgWGu1aNK0dGhxDB

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0dfcf96a5bf4b57adca7f7b7be626f64.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0dfcf96a5bf4b57adca7f7b7be626f64.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Users\Admin\AppData\Local\Temp\server7.exe
      "C:\Users\Admin\AppData\Local\Temp\server7.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:212
      • C:\Users\Admin\AppData\Local\Temp\server7.exe
        "C:\Users\Admin\AppData\Local\Temp\server7.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\server7.exe

    Filesize

    252KB

    MD5

    03ec59d46f70ebcd465e300f3cbfc3db

    SHA1

    3c5a71e00aaa4cafe4b9a999bfdeac0b14c5c4a5

    SHA256

    0ff91104c403e3bd08fa4062dd58a1c7b0d46e3ef7c82cd37ab92d3931ea8d15

    SHA512

    2e81df007a07228d0873286bbc052e765c1994fbca67d983a62a407e655feb2d5300284490d545251484d65a3370cec041adff97621360c26294ba9ae2ef2d4a

  • memory/3568-12-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/4620-15-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4620-19-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4620-20-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB