Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe
-
Size
797KB
-
MD5
82313d9072e776dcf2290245e35b2784
-
SHA1
f58849871cc85d60cc49af4e37e1ae845648c9f5
-
SHA256
f07e026ebe12f04343d27a35610cd195876501891518a005d64741402e7b4b8e
-
SHA512
0a487ca070fbb65cfe0da5477d3fdb6eae767a0b55198e0e288bd5e824bcd01f6846c7e6dabb06a73b37d73749212533beaeaac05f98a6a3b6cc5354ab1ac93b
-
SSDEEP
12288:8Zx7rMYV6MorX7qzuC3QHO9FQVHPF51jgctrcdX/xfLZ2YxfIxncr:8PBXu9HGaVHGxFt2dcr
Malware Config
Extracted
xloader
2.5
wme0
mobileads.network
smartplumbing.services
hessusmelke.quest
5gbusinessbestservices.com
soniceasy.com
sishikeji.com
streetstock.space
interchimp.com
sassholesentiments.com
lemon6.club
thestogiestore.com
11elevencouture.com
loveimperia.com
firstactrealestate.com
alstonimages.com
mainmanmemories.com
floridavillarealtor.com
selberherrlab.com
jurisfinca.quest
bakercsoncrete.com
tianzivip.com
xn--352bl9r2qa.com
appleicenter.com
lexahome.space
sitecsites.com
luceneo.com
redvelvettech.com
cometowish.com
buqrcu.biz
blueriverdairystore.kiwi
consumerproducts.guide
smartag1.xyz
amplifymycity.com
auth-paiement.com
6amtown.com
dailymbshop.com
viridisrc.com
nft-online.store
marketmakerstv.com
michaelburleigh.com
wetheyuva.xyz
jldd-881aae.com
mybloggi.com
bestofwaikiki.info
palisadestahoealpinemeadows.com
prsorgu.net
enriru.com
33m456.com
amyraldisms.info
tes5ci.com
oppignoration.com
dutchpetfelt.com
uspress1.com
typingfeedback.com
republicoflies.com
vintagehunterscrossing.com
topincsolutions.com
pgslotauto.win
dscape.net
ryans.press
oiae.top
g-spot.one
digiproductblackservices.com
mrpurplecow.com
souubeautyfull.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/436-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
82313d9072e776dcf2290245e35b2784_JaffaCakes118.exedescription pid process target process PID 4568 set thread context of 436 4568 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
82313d9072e776dcf2290245e35b2784_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
82313d9072e776dcf2290245e35b2784_JaffaCakes118.exepid process 436 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe 436 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
82313d9072e776dcf2290245e35b2784_JaffaCakes118.exepid process 4568 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
82313d9072e776dcf2290245e35b2784_JaffaCakes118.exedescription pid process target process PID 4568 wrote to memory of 436 4568 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe PID 4568 wrote to memory of 436 4568 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe PID 4568 wrote to memory of 436 4568 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe PID 4568 wrote to memory of 436 4568 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe PID 4568 wrote to memory of 436 4568 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe PID 4568 wrote to memory of 436 4568 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe 82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-