Analysis
-
max time kernel
139s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe
-
Size
687KB
-
MD5
55a9557fd520e2b5886a09ca8921def3
-
SHA1
a21c2095591a1ddd093242d45b2220bc4fad5298
-
SHA256
e8287d910fa441a9af68860be6dbeeb6ca4e6e5ee2920f1f2d66775dc7c30b05
-
SHA512
c7f90f43568f5e67675e4fbd870644066c43a028844415cac029c8493f6b5a3b34fc23eaf239c51a8572d01f1128233f66f17f4f32e142d8cd3262bed2ab8319
-
SSDEEP
12288:OMv/HK7z/vgOLvgA/5w6o8hTAfe0/RTc9e+FQ:mE0vl/5w6zBy49n
Malware Config
Extracted
xloader
2.3
uisg
editions-doc.com
nbchengfei.com
adepojuolaoluwa.com
wereldsewoorden.com
sjstyles.com
indigo-cambodia.com
avrenue.com
decaturwilbert.com
tech-really.com
kimurayoshino.com
melocotonmx.com
njrxmjg.com
amandadoylecoach.com
miniaide.com
kocaeliescortalev.com
ycxshi.com
f4funda.com
126047cp.com
projecteutopia.com
masksforvoting.com
indi-cali.com
ingam.design
theneighborhoodmasterclass.com
brandstormmediagroup.com
soothinglanguages.com
msmoneymaximiser.com
yduc.net
daniellageorges.com
lvaceu.com
institutoamc.com
hare-sec.com
asd-miris.com
beton-9.com
morehigher.com
cobblestoneroads.com
falhro.com
skincaretrial1.info
insideajazzyminute.net
loginforce.com
alluviumtheater.com
forevercelebration2021.com
wajeofxcv.com
ycshwhcm.com
rustyroselondon.com
forestbathingguru.com
gourmetemarket.com
dna-home-testing.com
assaulttrucking.net
nourgamalyoussef.com
soujson.com
sorelsverige.com
tandooridhaba.com
hypovida.foundation
iregentos.info
bjornadal.info
okdiu.com
857wu.com
3g54.club
xfa80.com
betxtremer.com
autominingsystem.com
ilcarecontinuum.net
eventualitiesofcrime.com
bst-gebaeudereinigung.com
makarimusic2020.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2608-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3956 set thread context of 2608 3956 55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2608 55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe 2608 55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3956 wrote to memory of 2608 3956 55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe 97 PID 3956 wrote to memory of 2608 3956 55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe 97 PID 3956 wrote to memory of 2608 3956 55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe 97 PID 3956 wrote to memory of 2608 3956 55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe 97 PID 3956 wrote to memory of 2608 3956 55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe 97 PID 3956 wrote to memory of 2608 3956 55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\55a9557fd520e2b5886a09ca8921def3_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-