Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe
-
Size
803KB
-
MD5
e74da43c10752c24480ed5a858a2575c
-
SHA1
cd0cf92a7f91c3d40fa227a74e64b2ab17b2d8c1
-
SHA256
3475cf4c5baf7775978dd90e069a76969ea94af43adc5e66ba0b931fed7d2106
-
SHA512
3a0ce9d27a239a1fb209df8e78b60e99b2c212290b31bc4ebf2454e7b9845deeaf4edc47ebf378d0495a3eece98a23ebe9100f24876a9383fda7cd35d4d19117
-
SSDEEP
12288:fb3bJeB6MaiyYxPrv8FOXxfMmWvkjiObHB7o:zcokCFWxfT5iO2
Malware Config
Extracted
xloader
2.3
uidr
dulichsongcham.com
cash-royal.com
geneseewildlifetrapping.com
9cc9x79m3y2.com
ntjjzx.com
joinglooko.com
upmchealhtrak.com
hookandcask.com
orca-web.com
ag3holdings.com
empoweredinvestmentstx.com
lustywall.com
rcpelaurentides.com
goyalcoorchidnirvanatwo.homes
iotajinn.com
littlemlive.com
hippocratesbio.com
ashleysema.design
175a45.xyz
bpocompaniesphilippines.com
leadmorecommunity.com
mrbobscleaning.com
newdistributorbbc.com
lxhfzy.com
physicianrepresentative.com
integrative-teletherapy.com
selllasheswithla.com
dbxff.com
pinewayorganics.com
bepongbeo.com
dbrulhart.com
thereallynicepeople.com
kakilangit.net
mndesignw.com
send86cells.com
gakkard.com
blacktiers.com
2603083932.xyz
tailoredlacedwigs.com
gaypridebusinessdirectory.com
cowbex.info
lakecharlestreeservices.com
4tza1.com
rimlyane.com
babadoes.com
missteenagerworld.com
womenreadytomove.com
connectingdaybyday.com
paygss.net
cachavachaayd.com
xn--80aaatqunmdeu5n.xn--p1acf
zxr.xyz
baignoire.sucks
analystsguild.com
60ro9e.com
goplaytolearn.com
virtualcarerehab.wiki
fschaogang.com
181215.com
theinlandempirelifestyle.com
laluccasa.com
bflat-store.com
frontrangespiceco.com
carrierocommerical.com
ios.run
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/1588-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1728 set thread context of 1588 1728 e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1588 e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1588 1728 e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe 30 PID 1728 wrote to memory of 1588 1728 e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe 30 PID 1728 wrote to memory of 1588 1728 e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe 30 PID 1728 wrote to memory of 1588 1728 e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe 30 PID 1728 wrote to memory of 1588 1728 e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe 30 PID 1728 wrote to memory of 1588 1728 e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe 30 PID 1728 wrote to memory of 1588 1728 e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e74da43c10752c24480ed5a858a2575c_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-