Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
277b8bac14e09015d53ad66c97e272a0
-
SHA1
ef1bd1e7dcd9633244c3e9bcaeef190ff8eab47d
-
SHA256
45fad79d5665cbad096d1029eb228bdca999352958c393d08e2813787fc2dcb0
-
SHA512
933f0dbc416e0d409aca40569b8b819690623e342de14aa8a1a51b1714018409bd7a818b334573dc7b1d9a36d4f365264d70bd6ddb16a4692a5c0d145209d708
-
SSDEEP
12288:SCpc6JmEOMCQryZ/3Mc64rc2JH9EY9n7MKScl8qRi7ggQDmH7PQ6H+Uy1Susr8Mk:LJ0MCiyHfc2bEYt7x83EOMZZS5R0
Malware Config
Extracted
xloader
2.3
udew
danieleawilliams.com
miladjalilian.com
hzmila.com
elecreator.com
instrep.com
4tongzhi.com
sltreeserv.com
expressrev.com
dataresearchcenter.com
filmblingalley.com
3buagency.com
hxjh888.com
gotmetwistedcomb.com
vihco.com
scg.solutions
drcvkm.com
frostresorts.com
gintech.co.uk
luxury-holding.com
roupasdobras.com
renewsamericas.com
bigjohnseatery.com
cenasymerienda.site
gumrukihaleleri.com
copyfolio.info
taoke666.net
xiamora.com
turnobyte.com
levoeushop.com
adburb.com
oneonecity.xyz
crmcheap.com
beiligao.com
digitalschool-ug.com
livinginroanoke.info
yourhiddenpurpose.com
aictin.com
bebelocare.com
onlyglaziers.com
mavericknm20.com
curve-designs.com
customshirtnearme.com
kallifoods.com
njrongjia.com
tacardia.email
tscysh.com
febrayer24.com
cuties4you.net
tripsandtritips.com
joshchez.com
bulukx.com
forgeofadyingstar.com
biggerscoops.com
rapidcovidscreening.com
greensborotreepros.com
iroogmak.com
houtb.info
afaccess.xyz
speakingsuite.com
onyxdigisol.com
sto-emega.com
rtmecha.info
christiandivainc.com
primebecas.com
agendno.com
Signatures
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2612-15-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2612-18-0x0000000000C50000-0x0000000000F53000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2356 set thread context of 2612 2356 277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2612 277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2612 2356 277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe 31 PID 2356 wrote to memory of 2612 2356 277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe 31 PID 2356 wrote to memory of 2612 2356 277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe 31 PID 2356 wrote to memory of 2612 2356 277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe 31 PID 2356 wrote to memory of 2612 2356 277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe 31 PID 2356 wrote to memory of 2612 2356 277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe 31 PID 2356 wrote to memory of 2612 2356 277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612
-