Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 16:47
Static task
static1
Behavioral task
behavioral1
Sample
0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe
-
Size
819KB
-
MD5
0250e6bc6bd00b67b62440914f4f9d86
-
SHA1
71ccf512311d0dc53e8cee5e05afe4253efee7f2
-
SHA256
e7d82461eec08c88e23ad2651e86e3a25d113dcce4402ccac789f0cffda7b71d
-
SHA512
4fc1eba75e8d5207270efa58298771c366c08eaefde275bf1c365a8d0aa9559593b52407d2159131cbfa7d254d558c63bcdd52dc524a8b2151776fbf02e6cb0c
-
SSDEEP
24576:EbQ+X8+UiDLbRHahtNrcI1UCHNda/wv7L8O3VjW:gCrj1dt2wjL8X
Malware Config
Extracted
xloader
2.5
cuig
sofiathinks-elderly.net
lahamicoast.info
2shengman.com
cbsautoplex.com
arcana-candles.com
genrage.com
kukumiou.xyz
thequizerking.com
sonataproductions.com
rebuildgomnmf.xyz
ubcoin.store
yiyouxue.net
firstlifehome.com
mdx-inc.net
gotbn-c01.com
dinobrindes.store
jcm-iso.com
cliente-mais.com
mloujewelry.com
correoversoi.quest
rc-rental-housing.com
swisstrustcitybank.com
traderjoes-corp.com
mandolinmeditations.com
kathcorp.com
mcdonaldsfastdel.xyz
nielsqanalytics.com
bansity.com
mimosymas.com
atp-cayenne.com
sinterekes.com
nnxsk.com
shushigallery.tech
thgn41.xyz
resporn.tech
growingki.com
themyopiatoolbox.com
angeleyesevents.com
reddishgomjtd.xyz
amazonretailbrickandmotar.net
jewelrybyjma.com
ctroutdoors.pro
357961.com
theakfam.business
skincarefamily.com
xptoempeendimentos.com
tapestrirewards.com
viridilodge.com
bostondowntownrealestate.com
disrepairclaimsuk.com
makaroff.net
thedoublezbar.com
barbicidemalaysia.com
sliv-a.online
showgeini.com
martialartsreigns.online
metamode.space
ch95516.ink
halvorson-pickup.com
mizuno-trouble.net
46dgj.xyz
esylf4vt.xyz
chopaap.com
igorleonardo.com
qtih.top
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2724-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exedescription pid Process procid_target PID 3000 set thread context of 2724 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exepid Process 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 2724 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exedescription pid Process procid_target PID 3000 wrote to memory of 2724 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2724 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2724 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2724 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2724 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2724 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2724 3000 0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0250e6bc6bd00b67b62440914f4f9d86_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-