Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
677768067d4d3af26b769528b9f1eda3
-
SHA1
701f0d306afbc48082a18befbe293640d7f31173
-
SHA256
748c630f8ec02411ebb563f2434619bc4b695eaaa6d254ed22f63e01d3775aa5
-
SHA512
eafbca515c7f00009f763022d22837abe99ec5125faf037be1a59d579dfe9a19a6246ae8d1c95c768ff74728512b5a80ce58d7085c6647eaa4d2ba7ff01a2104
-
SSDEEP
24576:qOf982sLr4W7xNZJretG/91XVavfHXl5YJu:W7xNj0GVa3vY
Malware Config
Extracted
xloader
2.3
owws
mytestin.com
thenakedjoypodcast.com
elsegundotequilabar.com
thefurryfriendsplace.com
sitowebcasavacanze.com
satellitepublishing.com
lowdownsports.net
angelsvideoproductions.com
bair-er.com
abilitycapitalpartners.com
bestmultifunctiontool.com
bloghappness.com
xn--xhq99jp6i75j.com
obxhwy12.com
dematoffer.com
ladderuptoday.com
christianipitts.com
shakambaricottons.com
dondelivery.net
ibextravetrailers.net
xinchu25.com
cunerier.com
hairbych.com
attesshop.com
jakeandaustintv.com
allergykolkata.com
twogirlsandamap.com
kwatrouna.com
20sdsd.com
nxxssf.com
eclubcampus.com
trendyclassicjewelry.com
alliesjewelryandcosmeticss.com
aectljnze.icu
yugioh-duellinks.site
nasduklah.com
baotengdress.com
getzloan.com
iheart2d.com
legendidstore.xyz
mobitehk.com
labor-exchange.net
tranhtheutayphongthuy.com
charlewood.com
marcelafallas.com
fermeandre.com
thewaltzmovie.com
ctr0.com
acmcars.net
opioidlivesmatter.com
yearroundtalent.com
ninabiemans.com
arte-comasagua.com
servitrek.com
jiujiure21.com
nirmanagritech.com
policy-secure.com
httpmilongamate.com
sunfoodhelp.com
dormontdems.com
mutterlydelicious.com
saok.info
idasostasodalar.com
msmichelleadams.com
sf-expresd.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2236-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2304 set thread context of 2236 2304 677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2236 677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2236 2304 677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2236 2304 677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2236 2304 677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2236 2304 677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2236 2304 677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2236 2304 677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2236 2304 677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\677768067d4d3af26b769528b9f1eda3_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-