Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 23:18
Static task
static1
Behavioral task
behavioral1
Sample
26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
26eeb1f0e1206232f233d3710729a98a
-
SHA1
2f49292e05aa8a155372c0856103131285fae88b
-
SHA256
ecd73f67ea2121ce3aa6ad9e7a63b5360ee5b928c94b69956d8227f54a951349
-
SHA512
37b10ee98d3a8775c308d61a88b74a5938815c8bcd272713ab9446a99af68d28ab7e5c06adf03e7a5a9edd4e2bebbfb9c3af0ca5e1df51539a33e30ffa4dc77e
-
SSDEEP
12288:yccaQxt8aq8vbgDPwFVt2NjFjO+ckz9EIFpR6lyLr4ukkknvlP7r9r/+pppppppb:bGb0wFVMNjs9E6QfEvl1+
Malware Config
Extracted
xloader
2.3
xcw2
expdallastx.com
vedanshhomoeopathy.com
ssmt66.com
echomc.xyz
myclarityplanner.com
abrosnm3.com
unitandrea.icu
dftuned.com
sbamilkingmachinery.com
lifesongmidwife.com
crepkonnect.com
reevoy.info
warisanoranglama.com
geotekmapping.com
eert.net
pcmajstor.com
32sj6dxrkx8pfp.xyz
zoomaconsultation.com
vinilikes.com
superbrandsstore.com
appbaidu.com
dias-agro.com
tenutesasimasardegna.com
orcharddryfruits.com
apollowang.com
mortgage941.com
tonechic.com
theseven-ups.blue
armopet.com
drive-skill.space
campbellrvs.com
kickasskeychains.com
vvipxx4.com
bestchoiceuc.com
votedeleon2020.com
sharsamcpa.com
yizddmall.com
stnup-ec.com
njhxcwzx.com
mjtaxrelief.com
raizesmarketing.com
manpasandmeatmarket.com
universalcustomframing.net
mathisbrothera.com
3790792.com
qykp-qzziw.xyz
catambra.info
gearchat.net
oilywaternews.com
mikizichy.com
sd956.com
l4sve.info
smallbusiness.review
newjerusalempictures.com
georgiahomesforless.com
winluxury.net
thepriceislight.com
aeonsjewelry.com
highticketsales.company
whelli.com
ecza-siparis.club
ajaylajworldcuisinesblog.com
thesmarterwaytosnack.com
kxd-led.com
coeurdaleneluxurylife.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4432-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exedescription pid process target process PID 1016 set thread context of 4432 1016 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exepid process 4432 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe 4432 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exedescription pid process target process PID 1016 wrote to memory of 4432 1016 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe PID 1016 wrote to memory of 4432 1016 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe PID 1016 wrote to memory of 4432 1016 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe PID 1016 wrote to memory of 4432 1016 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe PID 1016 wrote to memory of 4432 1016 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe PID 1016 wrote to memory of 4432 1016 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe 26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-