Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe
-
Size
494KB
-
MD5
99bc4a27617c8033e99798b86bf83139
-
SHA1
6ae1c65f9659fabf006c073f073cfdbbfe110534
-
SHA256
ba4821ef0b5dc9843ab5947e85b9810f3a96d0cdf2e9055761dc89f546ae9f93
-
SHA512
1aea828dd78522e007525d2800b0dac003607c5737437641ab76fc7266cc36dcb9e956f451e7fb060b2c8dcc98271df683a3e316727e58f9291181d2965baf27
-
SSDEEP
12288:FC0OjH/B15Ow35hQVwXJxcZwnEQ8J0F6zeX7KD/h1ZEk6eP9Ap1kZL:ADjf35Ou7PWvQ8Ja6zee7xv6+AC
Malware Config
Extracted
xloader
2.1
eao
littletram.com
vanmetaal.com
clubbingspringbreak.com
intohuman.com
steph.place
ipsumksa.com
paultoon.com
wocwebowecbweogw.com
beverlyhillsmerch.com
vans-athens.com
stylishnailsbyem.com
milletvit.com
pappyjacksburgershack.com
anal-liza.com
lotownerbuilders.com
caffinatics.com
cvbtrading.co.uk
pheasanttrailsgolfcourse.com
wed0888.com
sundeepm.com
moneymakersclub.net
candcsaptai.com
skogsframjandet.com
rockstarpartyrentals.com
prostylezhairsalon.com
rogue.football
selfsufficientlearners.com
wisdom-consult.com
pivicric.info
domainemariage.com
mathsforstudents.com
wowdaebak.com
linbook8888.com
exceeidt.com
aicebit.com
ncgf61.com
argenteriamantova.com
hey-bamboo.com
elgritodeharpo.com
realbrosofles.com
5766557.com
galileomkt.com
astrugar.com
haasmyasupportagency.com
power-realestate.com
14201shastaway.com
solofsantabarbara.com
magentnew.com
xuedaiting.com
accokeektvmounting.com
ressindia.com
abuju.com
commcheapshop.com
indokaryasm.com
taddle.one
economicdevelopmentsoftware.com
fayk222.icu
4winner.xyz
undefinedheightsinc.com
sunfloe.com
xp135.com
simoncablehair.com
condor-protection.com
dentoviaoneday.com
touchtoby.xyz
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3016-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exedescription pid Process procid_target PID 4532 set thread context of 3016 4532 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exepid Process 4532 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe 4532 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe 4532 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe 3016 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe 3016 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 4532 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exedescription pid Process procid_target PID 4532 wrote to memory of 3016 4532 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe 105 PID 4532 wrote to memory of 3016 4532 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe 105 PID 4532 wrote to memory of 3016 4532 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe 105 PID 4532 wrote to memory of 3016 4532 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe 105 PID 4532 wrote to memory of 3016 4532 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe 105 PID 4532 wrote to memory of 3016 4532 99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016
-