Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 04:27
Behavioral task
behavioral1
Sample
df7dd82296f49c9ae44bfe089a2b8811_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df7dd82296f49c9ae44bfe089a2b8811_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df7dd82296f49c9ae44bfe089a2b8811_JaffaCakes118.exe
-
Size
651KB
-
MD5
df7dd82296f49c9ae44bfe089a2b8811
-
SHA1
3730a9d9298ef7f63859f94061604c46e4e00eda
-
SHA256
0e91c074ba5c03e4ee87411351bc4d27a8d7b5e071739c32fc71842d8c22f591
-
SHA512
4cdac3636b58c0dc21ad70b8e8c4eff9e86c5841b7b27976aeaa8787c5648046149ad7609183d004f8b532cf57f68389571f6df008b3a9bf79c3344a55308f94
-
SSDEEP
12288:kpyZT1RrCxu/mDwLRI6BxcDqp9aqCcajVuD3Z7BPQGMWYur0s0D:kUx1RjOD3SxcDDcNDqWYurL0
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 14 IoCs
resource yara_rule behavioral2/memory/1512-0-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-1-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-2-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-3-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-4-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-5-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-6-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-7-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-8-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-9-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-10-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-11-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-12-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1512-13-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df7dd82296f49c9ae44bfe089a2b8811_JaffaCakes118.exe