Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 10:22
Static task
static1
Behavioral task
behavioral1
Sample
95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe
-
Size
731KB
-
MD5
95b1387dcc4d63bd61ee0d8d78c83a05
-
SHA1
6118fb9588414fa3c77f6f52b6a28e7b2bc2ef2f
-
SHA256
ec79bbedd58dd5c093422074221dd9dc49a95310d94655d90f68decd7f46321d
-
SHA512
a3012ad340b6b12a6d0a62ab3ec0313ae90e1a3e240e1c33054cf2d3f80f7a5d40510aecdf14bebd44af016cbe4b714d1f6974f28b0e4c6429a9c15888c77658
-
SSDEEP
12288:7ESoYEoSTvzz8f3fkd9UTVPra6+13sf8irOhRxuXC:7ESKoG0HYx
Malware Config
Extracted
xloader
2.4
nid3
bocadilleriapk2guadalajara.com
vaccinatedmaid.com
uvoznaroba.com
sore2.com
carphonegadget.com
0543hm.com
valglobalgroup.com
badbogeyclub.com
sonykameraja.biz
dpz831.icu
wyvernmediagroup.com
jason-luttrell.com
joehcq1.com
1aiizsbb.icu
thelousciouscocoon.com
crypto4.education
letrassinfronteras.com
truemovehispeed.com
se25diy.com
cisdax.com
tahlila.com
trdssdt.xyz
columbusgaragedoorinstaller.com
stormi.cloud
futbolgrafia.com
be7.top
huntthe.site
betvui.info
kimminjoung.com
tachibana5610.com
devils-brewmc42.com
compacttrailer.net
mxz9.com
jinsagency.com
arganfairtrade.com
terrysshop.com
cleoholdings.net
naijarain.com
oobertrek.com
yuchainpskxop.xyz
restromanage.com
musejewelryofficial.com
argoap.com
dswiosepbx.com
asjcy.com
devcodigital.com
vertxexepress.net
inchimica.com
isoleigonmediagroup.com
seowritingtool.com
diceylove.com
wecanseetoofar.com
sddebouchages.com
padbergpen.com
addtech.company
dbq123.com
caminosantiagofinisterre.com
tiihonen.info
diegos.xyz
shopsoya.com
artdannymarx.com
fdyzlly.icu
gvasollers.com
gyrso.xyz
diverontour.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2816-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exedescription pid Process procid_target PID 1964 set thread context of 2816 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exepid Process 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 2816 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exedescription pid Process procid_target PID 1964 wrote to memory of 2816 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2816 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2816 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2816 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2816 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2816 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 31 PID 1964 wrote to memory of 2816 1964 95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95b1387dcc4d63bd61ee0d8d78c83a05_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-