Analysis
-
max time kernel
91s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe
-
Size
312KB
-
MD5
5f49fda84fc5089cedbb50f7ac4eeb18
-
SHA1
d8d9bd3c19140ff441731d3fdabdac64d74f1417
-
SHA256
e4bf214f6939dae12a6a479bd64f129509aa74ae46033c1aee210acddb118077
-
SHA512
34bdc3f84c488618cd02e62d7826459953d80c295661a6ef6912c729cc9214dfe2e50f99dad5c90c21c6c2aaad9eb2e4e05a38047cb755fa16dab5d3acbfa421
-
SSDEEP
6144:LErqLj2iCjq2yy57+estGu7OAXQNOHW9QUVcLsG2aOkrI:LOBicyuItGu7Ol8lhoGzOL
Malware Config
Extracted
xloader
2.3
x9r4
hilakid.com
speeeeeed.com
sofiasaenz.com
thesixpackrevoloution.com
cryptocurrencytroll.com
navniddhiprinting.com
xn--v1bmo9dufsb.com
khabrindia.com
fsvirginia.com
bulukx.com
bigbookmoney.com
littlebirdbedtimestories.com
graececonsulting.com
jehonara.com
freshfoodandmood.com
strategoslatam.com
justcarbootsales.com
1233326.xyz
littleecr.com
bullyhillhouse.com
zhinengjiashiche.com
prestamosdecasautah.com
wg093.com
marxja.com
tangerinedisk.com
desocuparlosalverges.com
rmsnidlogini.email
enjoybi.com
buoyantcode.com
xyyanglao.com
hempzone-cosmetic.com
arthritiscompressiongloves.com
ourkatyhome.com
bigpapafoods.com
dalilagiacopohaymo.site
xn--schnppchenhuser-3kbh.info
esquina-burgau.com
alfahosting.store
samplecondo.com
blyntconcepts.com
baonguoidep.net
newyroklifeannuities.com
sarastoywarehouse.com
disciplednationscounsel.com
newrichwealth.com
supplementscambodia.com
bullet-darts.com
zaun.win
qualiteaof.life
alvi-international.com
rubberbeercoasters.com
crypticapital.com
georgiosteknakis.com
texasribsgt.com
whitehorse2.com
precitaparktownhome.com
update3online.com
1ms-shop.com
mhqingbaozhan.com
ducashemire.com
briarwoodcoops.com
knlmnz.life
maxiab.com
goodmornimngamerica.com
alchemywaxmelts.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2656-3-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exedescription pid process target process PID 2216 set thread context of 2656 2216 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exepid process 2656 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exepid process 2216 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exedescription pid process target process PID 2216 wrote to memory of 2656 2216 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe PID 2216 wrote to memory of 2656 2216 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe PID 2216 wrote to memory of 2656 2216 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe PID 2216 wrote to memory of 2656 2216 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe PID 2216 wrote to memory of 2656 2216 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe 5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f49fda84fc5089cedbb50f7ac4eeb18_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-