Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2025, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3e12b8afea58de423cc7802e1c08cc21.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3e12b8afea58de423cc7802e1c08cc21.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3e12b8afea58de423cc7802e1c08cc21.exe
-
Size
424KB
-
MD5
3e12b8afea58de423cc7802e1c08cc21
-
SHA1
9d45d694ef45044569134317f44f9408d6bc576f
-
SHA256
71d40dab85664fadb4ea163a1432504e8ee4a0581d1558f5f165f7c059b29741
-
SHA512
934057a7e492836740cc8a07b4eb6c9dc7a4e6ffb7e0fad07d1e8959bfdb3c02482d804c0c5b9f0cf9765f342adfe5aa25cf81e02ef98996bb8c07bca75353d8
-
SSDEEP
12288:vAm+pYQvfqKGdn0BzszOSVmvErDUWVaKYIq5y8P8B24G:vAX1vfmiY5VmMrvAIf
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader First Stage 15 IoCs
resource yara_rule behavioral2/memory/4640-2-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-3-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-5-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-6-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-7-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-8-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-9-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-10-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-11-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-12-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-13-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-14-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-15-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-16-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 behavioral2/memory/4640-17-0x0000000000400000-0x0000000000536000-memory.dmp modiloader_stage1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3e12b8afea58de423cc7802e1c08cc21.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4640 JaffaCakes118_3e12b8afea58de423cc7802e1c08cc21.exe