Analysis
-
max time kernel
138s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe
-
Size
816KB
-
MD5
4b152fa511993e3fababdeed5fadc362
-
SHA1
83b56d11cd855f1a760a1b810b5ee15ae2cd3452
-
SHA256
4280bb4e70e3ea349291f5674181b61c81a81a4dab4d6d52cae1e4e01a77928e
-
SHA512
2796cc71b0799866748a744e12809e336ce806f25bb84bf747e2947222bf2507475520451c321d420729cd0e6a9c5e8b9b4fb95ac3f2c413c8ee107f31fb13fd
-
SSDEEP
24576:R8LQozB5IlUYJDQ6UBAWtI9Pdu0nEZ8OZWT621ZHogD:+LQND7cAWtwPg0i
Malware Config
Extracted
xloader
2.3
rq6j
xiubanpei.com
cinderellaplus.com
jamascompany.com
bartarpay.net
iieom-l7f.net
wesleymerritt.com
applefolds.info
susanjkirkpatrick.com
bhavishyfoundations.com
joboval.com
countingdowntothecomans.com
mariamasal.com
michaelcajero.net
tradekindness.net
wonderwall.pro
babymaths.com
webdevalley.com
sculptingtreestudio.com
iblamatrading.com
quefautil.com
service-customer.net
pufs.online
auctionorbuy.com
beautifiable.com
thekenyahighschool.com
sunflowersbikini.com
shouzhitao.xyz
wordwidewebdesigner.com
alimentosvalencia.com
mergowines.com
dzen-onlain.xyz
fleatickcontrollux.com
claimref0.com
worldofbamboo.amsterdam
ezsusu.net
zmhy2016.com
queenreview.com
honourlock.com
touhaowo.com
newshivarestaurant.com
iia-online.com
patriotthirst.com
gov-cn.net
accubluehome.com
mummashop.com
abcodelivery.com
johnnycservices.com
pipperiod.com
evergreenmultilink.com
custompcqa.com
brianbuchholtz.com
seattleplasma.com
bigvideo24.com
physiobees.com
digitaldesigngenie.com
iglesiapentecostalreformada.com
fuhreke.art
yesdarlingtea.com
masakinakum.com
bulukx.com
azabmafia.com
jm9xc6.com
shopbeartique.com
blueswservices.com
digitalsellingplaybook.net
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3716-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1884 set thread context of 3716 1884 4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3716 4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe 3716 4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3716 1884 4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe 97 PID 1884 wrote to memory of 3716 1884 4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe 97 PID 1884 wrote to memory of 3716 1884 4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe 97 PID 1884 wrote to memory of 3716 1884 4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe 97 PID 1884 wrote to memory of 3716 1884 4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe 97 PID 1884 wrote to memory of 3716 1884 4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b152fa511993e3fababdeed5fadc362_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-