Analysis
-
max time kernel
10s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 19:44
Static task
static1
Behavioral task
behavioral1
Sample
0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe
-
Size
228KB
-
MD5
0c377447f098f43601e8c21609c41e1c
-
SHA1
8da17dacc87338c630430071efe7850ef34c0184
-
SHA256
3adaa1111196714a172b66f0deb9013f5b86c1671a7d126b69703d64e358f624
-
SHA512
b8746e95f87b7e948db46d4270ee10dc9a6fa1ef9e97defeda2a27053523928c9e8c79371799c2eb48569ca4f983801e15fd476de1a15f2b5c7e65703d32fdb0
-
SSDEEP
3072:/6HGteVUP/qOu43gC4S9HbJhElye1x8JtVTrrTlznlAPOwJFnS1mekUZPPRkTRKF:/dQOJu4wC3tfVSQnl6JFnom3UtPSTRSL
Malware Config
Extracted
xloader
2.3
ieqo
new-post-25782.xyz
podcastrrr.com
babyspageelong.com
boaddeo.club
distribuzionemedica.com
peaceofminderbinder.com
abbyrosemusic.com
odessawildliferemoval.com
prosperasight.com
liibbyapp.com
shandaferguson.com
kirsehiryenihaber.com
secured07b-chase.com
leanonmelifeadvice.com
securemtgs.com
temgk255.space
lunasparallevar.com
transportesdario.com
redwork.club
directopolis.com
sorevcbns.com
bibliothecadigital.com
theagileconfessional.com
lebottindesentreprises.com
dvd-org.com
1ajycapital.com
nailquan2.com
javacoffeebeans.com
sizish.com
susannhaehnel.net
gouaya.com
marvelstrikeclub.com
catwalkangels.com
runlywood-nambda.icu
hongfengjmzz.com
reviveyourride-detailing.com
x93snefkb9.com
irsettlement.com
injurylawyersnm.com
zhcc.ltd
homerivercommercial.com
drkitange.com
atauysal.com
sleekedup.net
ez-insurance-quotes.com
lumber-pt.com
citi-star.taxi
chimaratransport.com
absbropaul.com
jewelsbybri.com
racevc.com
buyer-centric.com
viableprocedure.com
paarlstudio.com
thinbluelinepatriots.com
crowtzequipped.com
missioncareasia.com
tesrvstorage.com
xn--zfrz5x6lhwxt66f.tech
mansmoon.com
werkstrand.cloud
amoscontent.com
exainc.net
cigartent.com
rukreditpay.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2116-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2088 set thread context of 2116 2088 0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2116 0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2088 0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2116 2088 0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe 31 PID 2088 wrote to memory of 2116 2088 0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe 31 PID 2088 wrote to memory of 2116 2088 0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe 31 PID 2088 wrote to memory of 2116 2088 0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe 31 PID 2088 wrote to memory of 2116 2088 0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c377447f098f43601e8c21609c41e1c_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-