Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 22:15
Static task
static1
Behavioral task
behavioral1
Sample
bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
bd5e83c955f9182b2b817fab68cebc47
-
SHA1
d232a8df698fc53cce2c89dbf43a7157f244b51c
-
SHA256
fc37dadf423f8e7a11742feee96ae0451905ce574e80eb7a1221b044946611eb
-
SHA512
174004cd0303edc684896ee2b23aa010a1ed0af1a741143ea70ba12e9281319c1383b9861b6df29ad5cd917edcb117325717da5bd42862defb7ca262ac26e51c
-
SSDEEP
24576:+nwvFd1jDiT4Wo8+sj1sqypu39GWG4UJKW1miLFeCXDMDYE:qwVBWo8zgWG4UJKW1miLFeCXDMDYE
Malware Config
Extracted
xloader
2.3
ur06
philippebrooksdesign.com
cmoorestudio.com
profille-sarina23tammara.club
dqulxe.com
uiffinger.com
nolarapper.com
maconanimalexterminator.com
bisovka.com
loveisloveent.com
datication.com
spxo66.com
drhelpnow.com
ladybug-cle.com
macocome.com
thepoppysocks.com
eldritchparadox.com
mercadolibre.company
ismartfarm.com
kansascarlot.com
kevinld.com
p87mbu2ss.xyz
the-makery.info
untegoro.site
newyorkcityhemorrhoidcenter.com
crystalclearwholistics.com
iregentos.info
fullskis.com
promanconsortium.com
800029120.com
mummyisme.com
humpychocks.com
myfavestuff.store
naturalfemina.com
bimetalthermostatksd.com
draysehaniminciftligi.com
sf9820.com
4thop.com
24les.com
thepupcrew.com
strangephobias.com
hotmamabody.com
restaurantsilhouette.com
texasadultdayservices.com
binahaiat.com
nipseythegreat.com
pelisplusxd.net
mamborio.com
elitedigitalperformance.com
therileyretreat.com
aieqbgk.icu
corkboardit.net
katieberiont.com
telemedicinehamilton.com
imagistor.com
tekdesignltd.com
bmw-7979.com
animaliaartist.com
straightlineautoserviceerie.net
qoo10online.com
tesseracoffee.com
central-car-sales.com
thecleaningenthusiast.com
musicmercch.com
pearlpham.com
allismd.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2260-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2312 set thread context of 2260 2312 bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2260 bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2260 2312 bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe 31 PID 2312 wrote to memory of 2260 2312 bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe 31 PID 2312 wrote to memory of 2260 2312 bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe 31 PID 2312 wrote to memory of 2260 2312 bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe 31 PID 2312 wrote to memory of 2260 2312 bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe 31 PID 2312 wrote to memory of 2260 2312 bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe 31 PID 2312 wrote to memory of 2260 2312 bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd5e83c955f9182b2b817fab68cebc47_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-