Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe
-
Size
817KB
-
MD5
60c1e3543bef5489370f880d332f2358
-
SHA1
c6c84fe8b32dcbf8fd8ba7da133ed444d6598bf4
-
SHA256
db49dbfeed349b8c5ac59aab65bd065a7e9d90a1a45bcee96301fae6cfd508ef
-
SHA512
7a00790a5676984d83686d6822798ed1b5c3078090699d6897a9bacd992c3369e614f623767a8d34062fa9654eb567c491052c486ea7fb9461987b148b36bad0
-
SSDEEP
24576:t9nGW5brV2HONizwaqD2Ip0ASwVPu00pji1BLOUAWFxu:tj53VN0w2Su
Malware Config
Extracted
xloader
2.3
ixwn
drmarshaskinner.com
lovablebrows.com
cnfmc.com
post1fr.com
54243474945delta5424.com
lauded.world
clansix.xyz
swipesells.com
au-hokuriku.com
alyxhoulie.com
kuponbank.com
unicdn.xyz
stearmanestates.com
shmily.life
hennessy-maluma.com
czechagents.com
zywbiiu.icu
gree-th.com
naturalboho.com
plusometer.com
ceylonjobs.com
bellavitasanctuary.com
rahnumanews.com
justiceforfitz.com
futurefungus.com
kasvyx.com
life3life.com
vauberdriver.com
randomwebdeal.com
infinityandmorellc.com
orleanshomevalues.com
femaletopic.com
phenexlogisticsinc.com
otchormonesolutionsllc.com
commoncorestandardswriting.com
icelandicflightacademy.com
shopsermuse.com
redcandlemedia.net
hausoftempo.com
ppewithoutborders.com
refractsure.com
beachhomesinsurance.com
xn--0421-p73c9a32a.com
cyafreightsolutions.com
mercaderlatino.com
bulukx.com
scratchingmaps.com
noithathalo.com
china-zhongzhi.com
vodflix.xyz
v-tore.com
mypheloan.com
welcomehotelayodhya.com
doxunlimited.com
intellingentsf.com
hempsauna.com
germxstore.com
ranchodelacruzvs.com
surgyaan.com
vmanagementgroup.asia
oaktreeworld.com
damnginallc.com
tipsnp.com
veextech-th.com
fevvwji.icu
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4712-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4560 set thread context of 4712 4560 60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4712 60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe 4712 60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4560 wrote to memory of 4712 4560 60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe 97 PID 4560 wrote to memory of 4712 4560 60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe 97 PID 4560 wrote to memory of 4712 4560 60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe 97 PID 4560 wrote to memory of 4712 4560 60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe 97 PID 4560 wrote to memory of 4712 4560 60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe 97 PID 4560 wrote to memory of 4712 4560 60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\60c1e3543bef5489370f880d332f2358_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-