Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe
-
Size
567KB
-
MD5
e78a8c49a3846c8224702bdfe143d6b9
-
SHA1
f35ee4878252d4a6c38971a0768b2adff12ceffe
-
SHA256
8f7fa187226287ba3a8858e75b00b021022fbfbc8f1f7ae01557cf692510fe00
-
SHA512
6902c408ee655a97d3e9c9a056c57716e964f1ef5beaaa40b30a95fad93a8f13167872fa53e7c7a9574c2544ee36f6f2c3bf3fe42063871f0dc89513af0bdc1e
-
SSDEEP
12288:bEpO29Vm7Fru4efOhizn2MJT6YashlM0JT6YashlMCDvoP:4pXm704Tho2I9ashlV9ashlr8
Malware Config
Extracted
xloader
2.5
n092
classictilematch.net
joy-one.xyz
paraflexwork.com
eurxtoa.online
azrock-express.com
rojareal.com
weprepareamerica-world.com
boss-investor.com
sportstrainernetwork.com
hoshibanamogurablog.com
thymoscorp.com
dqrygx.com
multispicesindonesia.com
fortydaysaesthetic.com
citycourtlafayetteclass.com
sporexx.com
mahsaparvizi.com
casinort.net
arssaf.com
cupandthoughts.com
intellicomeg.com
narbaal.com
cadmiumbnuxek.xyz
bitchlovepickle.com
ktnfashion.xyz
vipersafetyinc.com
bimcellbugece.com
dads-abs.com
lvchicagoclassics.com
photomufuid.com
highclassescorts.xyz
cnywocean.com
utlhdas42.com
vecup.com
dmfcommercialrealty.com
binges66v.com
lyrxljj.com
saddlestories.com
weddinglevel.com
gratitudeideas.com
datalign-autos.com
theklownz.com
inetizennews.com
pr00thmatic.com
mobileledsigns.com
jasdmie.com
hivizpeople.com
lingmao08.com
tanzibkarate.quest
auto-leon.com
33m456.com
roomit.online
3345931.com
zhizhengsf.com
akatlarlionsleo.com
thelinencottages.com
noysana.com
chaitu.club
mooddeluna.com
pleasantpixels.art
dealsmapbiz.com
pedbordmcq2021.com
isd-sp.net
dynamoproperties.com
awbnmnmammmamnre.top
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2740-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2332 set thread context of 2740 2332 e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2740 e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2740 2332 e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2740 2332 e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2740 2332 e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2740 2332 e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2740 2332 e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2740 2332 e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2740 2332 e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e78a8c49a3846c8224702bdfe143d6b9_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740
-