Analysis
-
max time kernel
112s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe
-
Size
777KB
-
MD5
f7e38bf7062e2476eb111fd95288e2b5
-
SHA1
7ef1768ac9a9860b75503312eb1455f4e300cdbf
-
SHA256
a815ffed78a03eb9a180c0a70b50ce7c6f283fd98e0d590ebbb5f1e0b35fcd65
-
SHA512
c11b9b23f33ba102cdff70420f5bbe68a1ff88b244df2c82cfbaa1b996d1162c2db9384238e8a414a518e5aace4be1736f5399c46f457eb695bac40384a1f215
-
SSDEEP
12288:G6foWJcSbkFHcb7/mY/TGhQOPT4WfwRfWROQ5g0x6dgX6okimIf9vSgBS/G6OxfM:RJPb7/bT2D5giGfFaq
Malware Config
Extracted
xloader
2.3
uszn
animegriptape.com
pcpnetworks.com
putupmybabyforadoption.com
xn--jvrr98g37n88d.com
fertinvitro.doctor
undonethread.com
avoleague.com
sissysundays.com
guilhermeoliveiro.site
catholicon-bespeckle.info
mardesuenosfundacion.com
songkhoe24.site
shoecityindia.com
smallbathroomdecor.info
tskusa.com
prairiespringsllc.com
kegncoffee.com
clicklounge.xyz
catholicendoflifeplanning.com
steelobzee.com
xiknekiterapia.com
whereinthezooareyou.com
maglex.info
dango3.net
sqjqw4.com
theparadisogroup.com
karthikeyainfraindia.com
luewevedre.com
helpwithmynutrition.com
lengyue.cool
pbipropertiesllc.com
glidedisc.com
sz-rhwjkj.com
776fx.com
kamanantzin.com
grandwhale.com
trump2020shop.net
gentilelibri.com
jarliciouslounge.com
dgcsales.net
hypno.doctor
holidayinnindyairportnorth.com
buysellleasewithlisa.com
girishastore.com
tinynucleargenerators.com
crystalphoenixltd.com
lapplify.com
bailbondinazusa.com
michaelmery.com
tripleecoaching.com
fastenerspelosato.net
horisan-touki.com
marketingavacado.com
centrebiozeina.com
xn--3etz63bc5ck9c.com
rhemachurch4u.com
homeschoolangel.com
romeysworld.com
themixedveggies.com
queendreea.club
epedalflorida.com
blutreemg.com
nongfupingtai.com
shikshs.com
besteprobioticakopen.online
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2748-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1480 set thread context of 2748 1480 f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1480 f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe 2748 f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1480 f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2748 1480 f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe 29 PID 1480 wrote to memory of 2748 1480 f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe 29 PID 1480 wrote to memory of 2748 1480 f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe 29 PID 1480 wrote to memory of 2748 1480 f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe 29 PID 1480 wrote to memory of 2748 1480 f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe 29 PID 1480 wrote to memory of 2748 1480 f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe 29 PID 1480 wrote to memory of 2748 1480 f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\f7e38bf7062e2476eb111fd95288e2b5_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-