Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe
-
Size
871KB
-
MD5
4a18a824aecef26f86a454b0a568ed55
-
SHA1
96b62057be687eef380d5d580003719aa5c6f32d
-
SHA256
ebceba62910d7167907d9ece3bdce1dacdf778e82d07801478e0240621100b25
-
SHA512
c8b9383b281fddb4a82a45271513de43b2a82454fdcb4fb55b7797d53d8a16c7018b495cfbe0a5c90feaf6ed3158c1197dfc3562a32fc53e373a0a8780cd59e6
-
SSDEEP
12288:uWK3n3qGaNHEyC9/oR9gy5FHK7zMQSGedS0N2hIbUKf8DZAiMKRT1VOeJLz2HVJ0:uWKnPp9AR95yv0dS0wIP8DZAiLT1FU0
Malware Config
Extracted
xloader
2.3
ixwn
drmarshaskinner.com
lovablebrows.com
cnfmc.com
post1fr.com
54243474945delta5424.com
lauded.world
clansix.xyz
swipesells.com
au-hokuriku.com
alyxhoulie.com
kuponbank.com
unicdn.xyz
stearmanestates.com
shmily.life
hennessy-maluma.com
czechagents.com
zywbiiu.icu
gree-th.com
naturalboho.com
plusometer.com
ceylonjobs.com
bellavitasanctuary.com
rahnumanews.com
justiceforfitz.com
futurefungus.com
kasvyx.com
life3life.com
vauberdriver.com
randomwebdeal.com
infinityandmorellc.com
orleanshomevalues.com
femaletopic.com
phenexlogisticsinc.com
otchormonesolutionsllc.com
commoncorestandardswriting.com
icelandicflightacademy.com
shopsermuse.com
redcandlemedia.net
hausoftempo.com
ppewithoutborders.com
refractsure.com
beachhomesinsurance.com
xn--0421-p73c9a32a.com
cyafreightsolutions.com
mercaderlatino.com
bulukx.com
scratchingmaps.com
noithathalo.com
china-zhongzhi.com
vodflix.xyz
v-tore.com
mypheloan.com
welcomehotelayodhya.com
doxunlimited.com
intellingentsf.com
hempsauna.com
germxstore.com
ranchodelacruzvs.com
surgyaan.com
vmanagementgroup.asia
oaktreeworld.com
damnginallc.com
tipsnp.com
veextech-th.com
fevvwji.icu
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/1696-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4472 set thread context of 1696 4472 4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1696 4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe 1696 4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4472 wrote to memory of 1696 4472 4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe 103 PID 4472 wrote to memory of 1696 4472 4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe 103 PID 4472 wrote to memory of 1696 4472 4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe 103 PID 4472 wrote to memory of 1696 4472 4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe 103 PID 4472 wrote to memory of 1696 4472 4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe 103 PID 4472 wrote to memory of 1696 4472 4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a18a824aecef26f86a454b0a568ed55_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-