Analysis
-
max time kernel
95s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 04:19
Static task
static1
Behavioral task
behavioral1
Sample
df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe
-
Size
554KB
-
MD5
df7a6f8b6b7e09da8d6f888c685959a8
-
SHA1
b48a39435dc7c3ea2b81f77f5e47f773f0fddc6e
-
SHA256
ac1b472428b0eb2579043f4b91419ee8ba365e23d3be3fd5459b0653e5a7343a
-
SHA512
3f7d3a5dfb40e18fe10a95e0370a7bce9a50ba3b7a6a5c5fd1f62b512307b646a83c82446d480ea035ad5d80b02971dc59f06cf57723282d9162aad6547a112c
-
SSDEEP
12288:+TjP6eP9QD0sYmC4Gs2QwSsKG1+3SLErZXWfcl:SjP6+QD0sYmC4d2pWxWs
Malware Config
Extracted
xloader
2.1
eao
littletram.com
vanmetaal.com
clubbingspringbreak.com
intohuman.com
steph.place
ipsumksa.com
paultoon.com
wocwebowecbweogw.com
beverlyhillsmerch.com
vans-athens.com
stylishnailsbyem.com
milletvit.com
pappyjacksburgershack.com
anal-liza.com
lotownerbuilders.com
caffinatics.com
cvbtrading.co.uk
pheasanttrailsgolfcourse.com
wed0888.com
sundeepm.com
moneymakersclub.net
candcsaptai.com
skogsframjandet.com
rockstarpartyrentals.com
prostylezhairsalon.com
rogue.football
selfsufficientlearners.com
wisdom-consult.com
pivicric.info
domainemariage.com
mathsforstudents.com
wowdaebak.com
linbook8888.com
exceeidt.com
aicebit.com
ncgf61.com
argenteriamantova.com
hey-bamboo.com
elgritodeharpo.com
realbrosofles.com
5766557.com
galileomkt.com
astrugar.com
haasmyasupportagency.com
power-realestate.com
14201shastaway.com
solofsantabarbara.com
magentnew.com
xuedaiting.com
accokeektvmounting.com
ressindia.com
abuju.com
commcheapshop.com
indokaryasm.com
taddle.one
economicdevelopmentsoftware.com
fayk222.icu
4winner.xyz
undefinedheightsinc.com
sunfloe.com
xp135.com
simoncablehair.com
condor-protection.com
dentoviaoneday.com
touchtoby.xyz
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3676-10-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2896 set thread context of 3676 2896 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2896 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe 2896 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe 2896 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe 3676 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe 3676 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2896 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2896 wrote to memory of 3676 2896 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe 100 PID 2896 wrote to memory of 3676 2896 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe 100 PID 2896 wrote to memory of 3676 2896 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe 100 PID 2896 wrote to memory of 3676 2896 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe 100 PID 2896 wrote to memory of 3676 2896 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe 100 PID 2896 wrote to memory of 3676 2896 df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\df7a6f8b6b7e09da8d6f888c685959a8_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-