Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe
-
Size
727KB
-
MD5
589e7ca0f06ddb626d2ffb0cd5d96672
-
SHA1
be4cac3604c3d698d8b1770304ac8be18967932d
-
SHA256
1277fb7fda4e11d5c61a6c07df4af7712070f01e002d54683c879c23e739519f
-
SHA512
3f4d39373c7e245acaeb47d5ed5b1a748111ba25aa7fb2256ad88577fae283990e335ab42a4129c49fa89328686fd4f07752da4f7036d9abad5727f2e82f84e6
-
SSDEEP
12288:XOL2EC+KNAlnSVi4dVNkKQqdiuV7a+u9LjyXyM+v9u6G1xgm:XGRYAlnG7T9V7a71j8L+Y6G1xg
Malware Config
Extracted
xloader
2.1
0tog
nordicgeneralcounsel.com
global1pbx.com
schoolcovidmap.com
asfsonline.net
landquestlandscape.com
streetsaheadleisure.com
acterialed.store
supremehtv.com
oregondst.com
gsmits.com
goldershealth.com
ideagroup.one
405eastfirststreetnapa.com
cleidgarciamarket.com
buybeatsbydre.com
icdr1.com
mydivinedelights.com
trotinette-electrique-shop.com
bigbrainmedialv.com
greatheightstours.com
lernhom.com
parasstrategic.com
contentnetworking.team
goofinc.com
countryfarmestate.com
onthesidephotographybymandy.com
relaxabyebaby.com
bluebuttonstudios.com
myburlingtonfeedback.com
waterfeaturessale.com
jamesfineartifacts.com
dy236.com
gearalert.net
contentx.info
abortioncam.com
aldirector.com
healtheworldsites.com
bornxxtra.com
gurancapital.com
lelnacher.com
prospecttop.com
addueldesign.com
rhotoken.com
autoselections.com
goodbuy.club
xn----7sbadc9ejcoh.xn--p1acf
die-beatmaker.com
cortexkeyboards.com
luxelweb.com
blog-towards-the-future.com
nepap.net
ahavahshop.com
ppc-listing.info
mmognation.com
besttoasterovens2021.com
zenglamour.life
memohoster.com
minsterleisurehomes.com
thegurlzrm.com
832lafayettest.com
dynamiceagles.financial
jomedar.com
simplexmedicare.com
pizzagate.computer
satssar.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2348-4-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exedescription pid process target process PID 2508 set thread context of 2348 2508 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exepid process 2508 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe 2348 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exepid process 2508 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exedescription pid process target process PID 2508 wrote to memory of 2348 2508 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe PID 2508 wrote to memory of 2348 2508 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe PID 2508 wrote to memory of 2348 2508 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe PID 2508 wrote to memory of 2348 2508 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe 589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\589e7ca0f06ddb626d2ffb0cd5d96672_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348