Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe
-
Size
647KB
-
MD5
f1aeda7230a594789e453f1c79ecb109
-
SHA1
ccfd3cc26c22d2bd3a7a898f8281d9ad15f16919
-
SHA256
12cca0f706a412c3b9094a389be002b7afa465adaacefa5f70b1cefe83e33bff
-
SHA512
b3dd5d5b37b6bfe27e5d768d60157f6a8e4415621330725c42865cb6c59906bb5aa65f09e9b40760b56227f458b4682e34ceafa8f8a77c52c2d8d8e948fd7682
-
SSDEEP
12288:gC7ri0J3ZetpEYKD1kyVdR0ex86x+Ok6g5vk:gC3dZetpEH4eypOk6gZk
Malware Config
Extracted
xloader
2.3
gh6n
cpschoolsschoology.com
thestocksforum.com
pixiewish.com
sopressd.com
muktokontha.com
tiejiabang.net
fdo.technology
kuringnl.com
barbarapastor.com
21stcenturytrading.com
digiwarung.com
canvafynyc.com
forfaitinghouse.com
3704368.com
mymonwero.com
ponpow.com
fringe.golf
heartfeltindonesia.com
defensivedrivercpc.com
allaboutgt.com
truerootsgroups.com
thatsfreakinridiculous.net
soulmohal.com
socalyardspotter.com
pmpts.com
ypb.xyz
tecs777.com
coimpexp-fab.com
romulusphotographer.com
spaceoffsexs.space
eatingdisordersnutrition.com
crackedappel.net
fore-all-llc.com
satishkasetty.com
itallcomesdown.com
ireneverda.com
mylenenadon.com
xn--zrz537c.com
treemuebles.com
iseyararbilgiler.com
mypinnacledesign.com
opvine.com
fenixcartagena.com
schiffrealty.net
lumbuy.com
seanwidmier.com
bondarizati.com
a1bulkemail.com
beuatifulbigwomen.website
nadyadheshop.com
clasificadosvallarta.com
magestosopneus.online
klub65.com
sexrobocabs.com
titanshop.info
valuecaptain.com
bostonm.info
standonir.com
acrellp.xyz
miyumiyuchancosplay.com
victorcarvalhooficial.com
bidaitosou.com
timership.com
cathbilson.com
aslionlinestore.com
Signatures
-
Xloader payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5020-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/5020-15-0x00000000016B0000-0x00000000019FA000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exedescription pid Process procid_target PID 2840 set thread context of 5020 2840 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exepid Process 5020 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 5020 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exedescription pid Process procid_target PID 2840 wrote to memory of 5020 2840 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 91 PID 2840 wrote to memory of 5020 2840 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 91 PID 2840 wrote to memory of 5020 2840 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 91 PID 2840 wrote to memory of 5020 2840 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 91 PID 2840 wrote to memory of 5020 2840 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 91 PID 2840 wrote to memory of 5020 2840 f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-