Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe
-
Size
647KB
-
MD5
f1aeda7230a594789e453f1c79ecb109
-
SHA1
ccfd3cc26c22d2bd3a7a898f8281d9ad15f16919
-
SHA256
12cca0f706a412c3b9094a389be002b7afa465adaacefa5f70b1cefe83e33bff
-
SHA512
b3dd5d5b37b6bfe27e5d768d60157f6a8e4415621330725c42865cb6c59906bb5aa65f09e9b40760b56227f458b4682e34ceafa8f8a77c52c2d8d8e948fd7682
-
SSDEEP
12288:gC7ri0J3ZetpEYKD1kyVdR0ex86x+Ok6g5vk:gC3dZetpEH4eypOk6gZk
Malware Config
Extracted
xloader
2.3
gh6n
cpschoolsschoology.com
thestocksforum.com
pixiewish.com
sopressd.com
muktokontha.com
tiejiabang.net
fdo.technology
kuringnl.com
barbarapastor.com
21stcenturytrading.com
digiwarung.com
canvafynyc.com
forfaitinghouse.com
3704368.com
mymonwero.com
ponpow.com
fringe.golf
heartfeltindonesia.com
defensivedrivercpc.com
allaboutgt.com
truerootsgroups.com
thatsfreakinridiculous.net
soulmohal.com
socalyardspotter.com
pmpts.com
ypb.xyz
tecs777.com
coimpexp-fab.com
romulusphotographer.com
spaceoffsexs.space
eatingdisordersnutrition.com
crackedappel.net
fore-all-llc.com
satishkasetty.com
itallcomesdown.com
ireneverda.com
mylenenadon.com
xn--zrz537c.com
treemuebles.com
iseyararbilgiler.com
mypinnacledesign.com
opvine.com
fenixcartagena.com
schiffrealty.net
lumbuy.com
seanwidmier.com
bondarizati.com
a1bulkemail.com
beuatifulbigwomen.website
nadyadheshop.com
clasificadosvallarta.com
magestosopneus.online
klub65.com
sexrobocabs.com
titanshop.info
valuecaptain.com
bostonm.info
standonir.com
acrellp.xyz
miyumiyuchancosplay.com
victorcarvalhooficial.com
bidaitosou.com
timership.com
cathbilson.com
aslionlinestore.com
Signatures
-
Xloader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2556-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2556-14-0x0000000000810000-0x0000000000B13000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exedescription pid Process procid_target PID 2112 set thread context of 2556 2112 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exepid Process 2556 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exedescription pid Process procid_target PID 2112 wrote to memory of 2556 2112 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2556 2112 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2556 2112 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2556 2112 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2556 2112 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2556 2112 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2556 2112 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556
-