Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe
-
Size
757KB
-
MD5
26a5cbbf551c2a810792aad03ed4d51b
-
SHA1
b509a59df8bcbb441cb8f527c920a37e49521098
-
SHA256
af164cd974521a1577be7c68ed0babe78e59f94ae13f79777f8565cef148c09f
-
SHA512
4c40d768a311682b16e8309e8d94216ecb27988f95dbe78645ab7de856c5f78b333ec608a37b21448f6abc0fd4c5976aa7a46aa3adad2423941a8e71fa093ee0
-
SSDEEP
12288:j4jGha4fxBa4wlDKffkMZvhxgnjeQZbzO/pEDAM3HFQYzPB8:jKlaBa1sMMZvIniOzOhEVQ0
Malware Config
Extracted
xloader
2.1
0tog
youronlinedreambusiness.com
smileyefero.com
cakoi.xyz
webhostpm.com
kuralike.com
icfc-lr.com
cosyduck.com
carsmovietheater.com
patchwholesale.com
cdershoushichang.com
hanweiled.com
bestselfietools.com
debatestt.com
elidasimports.com
ancestry-render.net
cxyl968.com
diamantes500.net
yumesouko.xyz
martinezaffordableplumbing.com
idecu.website
studentsofboogaloo.com
netrworksoultions.com
xn--7ory4g8yg1uq.net
hiperwindow.com
ok2cash.com
ruggedhempwear.com
ddianping.com
davabeauty.com
splishysplashie.com
flightstorehk.com
casecay.com
friscolakecondo.com
homecaredispatch.com
lifeupnow.com
conscioussoulleaders.com
ectattoopiercing.xyz
prostitutkisamaryenjoy.info
zsdyy.com
fernandoebetina.com
sarrahreeshomecafe.com
tigereyerealty.com
yoolo.net
onepasspay.com
thepintrip.com
oghomeinfoa21.club
akinaapothecary.com
copybyhillary.com
cutandsewspshop.com
allnetamericas.com
orostationautospa.com
xurealeducation.com
aromatherapie-inside.com
lucaswebinars.com
shireenarani.com
localjusticenews.com
elmultiplicador.com
officialvegansociety.com
changecove.net
jaichapple.com
psicotecnicosalcobendas.com
dixieldartp.info
womxninbusiness.com
gktradeisrael.com
benjamin-anthony.com
ugpounds.info
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4124-4-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exedescription pid Process procid_target PID 1248 set thread context of 4124 1248 26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe 82 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exepid Process 1248 26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe 1248 26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe 4124 26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe 4124 26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exepid Process 1248 26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exedescription pid Process procid_target PID 1248 wrote to memory of 4124 1248 26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe 82 PID 1248 wrote to memory of 4124 1248 26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe 82 PID 1248 wrote to memory of 4124 1248 26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26a5cbbf551c2a810792aad03ed4d51b_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-