Analysis
-
max time kernel
141s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/01/2025, 01:16
Behavioral task
behavioral1
Sample
JaffaCakes118_1d0c92a7e9e102f5600df4e88c5d75a6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1d0c92a7e9e102f5600df4e88c5d75a6.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1d0c92a7e9e102f5600df4e88c5d75a6.exe
-
Size
329KB
-
MD5
1d0c92a7e9e102f5600df4e88c5d75a6
-
SHA1
39621fc324c1922728f69147cbbbdaf0bbcb4e17
-
SHA256
4f9f006fc59a34e6e5f66690dd173372abe1d7369f662eebfd97b7bdf22e301f
-
SHA512
7ca744f1100ed315d008d2c872f0a01f11afbfe3e234cb0242d011500f466b5ef62f3271652496df29ff92bb009bea6a47d524e60158d331052d80d0da242cd2
-
SSDEEP
6144:PDLrx7vllIccv3Koy8BzoFL4y/LAHQjobM3fO1GWogwloLcz:PPrF9qbv6oy1HAwjoKGgWy5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/memory/1720-1-0x0000000000400000-0x00000000004D5000-memory.dmp modiloader_stage2 behavioral1/memory/1720-4-0x0000000000400000-0x00000000004D5000-memory.dmp modiloader_stage2 behavioral1/memory/1720-8-0x0000000000400000-0x00000000004D5000-memory.dmp modiloader_stage2 behavioral1/memory/1720-10-0x0000000000400000-0x00000000004D5000-memory.dmp modiloader_stage2 behavioral1/memory/1720-14-0x0000000000400000-0x00000000004D5000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1d0c92a7e9e102f5600df4e88c5d75a6.exe