Analysis
-
max time kernel
134s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 16:54
Static task
static1
Behavioral task
behavioral1
Sample
abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe
-
Size
797KB
-
MD5
abd030bf8bc89061525172a66d7b3529
-
SHA1
75a5b2bf4b045b15e28d57f644acb346f94a828a
-
SHA256
8c40d61e9bc6b4bae1468a3ad4f944512a2b5abe3ac440b961efb6c7c490f248
-
SHA512
5423857f45d59bf5f03f460b77a8decfc40d8bbb2071f97441df87705dfc39b38dfcb9a3c3570f2661b70893d63b49293270dc3522f2171b90152ca5a46eaf26
-
SSDEEP
12288:FC5C59YV6MorX7qzuC3QHO9FQVHPF51jgctrcdX/xfLZK+jNnhvu11JlDk3C47Co:eBXu9HGaVHGxFtK+ZhQ4ZD
Malware Config
Extracted
xloader
2.5
fpdi
jencio.com
b9jty7.com
banahinvestments.com
capitolfurniture.net
jlvip1086.com
pompeyocargo.com
designbyshubhi.info
elbauldepecas.com
bracelexx.online
advanceporbrx.xyz
ruihongco.com
wipemirecord.com
goodfoodsme.com
sommpick.com
rangilugujarat.com
realestate5g.com
spunkdlashes.com
palisadestahoehousing.com
brandingsocal.com
privatejetsboston.com
strataguide.com
pragmatismtoday.com
teslapro1.com
picturebookoriginals.com
nbrus.com
lafon-fr.com
studyallenergy.com
opensourcedao.com
cerulecode.com
c2spreader.info
hamiker.com
slimming-belt.store
myraandmarlow.com
sellanycar.online
mokkaoffice.com
strazde.com
haharate.quest
xgustify.xyz
sisoow.rest
awesomeclub98.club
ashleymariephotographyllc.com
mobilethaimassageatl.com
petswastepickup.com
eco1tnpasumo1.xyz
social-nudge.com
osmorobotics.com
99044222.com
xuebaousa.com
madisonbroadband.com
lisworldart.com
tzuzulcode.com
gonzagacargo.com
kanpekisien.com
currysrilanka.com
designedairservices.com
sato76.com
weinsteinanddouglas.com
gearella.com
tes5ci.com
obatkuatsemarang.xyz
tdaiarquitectura.com
reshawna.com
pfmtime.com
eastendfinancial.com
walletwriter.space
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4112-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exedescription pid process target process PID 3280 set thread context of 4112 3280 abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exepid process 4112 abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe 4112 abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exepid process 3280 abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exedescription pid process target process PID 3280 wrote to memory of 4112 3280 abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe PID 3280 wrote to memory of 4112 3280 abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe PID 3280 wrote to memory of 4112 3280 abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe PID 3280 wrote to memory of 4112 3280 abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe PID 3280 wrote to memory of 4112 3280 abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe PID 3280 wrote to memory of 4112 3280 abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112