Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
a258ac40b5c62c1ac1124ace071c69dd
-
SHA1
0933c2e288e682513d149fba882a5734d6164072
-
SHA256
8b520ce0de0ae8276e9c19053cae465454c94c963834166cfe5b2eb43f6050e4
-
SHA512
242bf0135b3d3c7ac810b3e869941b65ed196502bb99abd6bc51bd2f2ad229864efe3d465d94e2e2ac23efa5c70262611766b6513e4c09d66da424194f52559d
-
SSDEEP
12288:X3/OmzXhHYNrG4H/8gA1jg0vbZBrLAkd2CZjjhmnqQ6H+Uy1Susr8MmH3ji:GmThKG4f8njrskUCdtq3ZZS5R0
Malware Config
Extracted
xloader
2.3
o9pi
ljhhtls.com
xaomuondoi.xyz
michaelegerberlegacy.net
theboombastics.com
stonecrabnews.com
manerrtherd-online.com
tresegundos.com
cityedirectory.com
immopanama.com
natjurals.com
blun33.com
facilmkt.com
giulz.com
comparateurassurancesante.net
lpcavoca.church
xn--u9jy72gkoryg6abnb.com
porcelain-jewels.com
veraleiloes.com
ioc.coffee
batesjanitoral.com
whitecoe911.info
ypassociatesfue.com
dorsetbarriers.com
latestnaijainfo.com
istinfoway.com
evbatterychargers.com
bklobstermacandcheese.com
new-yorkcitylocksmith.com
nigeriauk.com
bet365l4.com
wealthtells.com
questsemi.com
busby.group
wickedcricketz.com
yogaceramics.com
appleidlognin.com
kentandersonrealestateteam.com
ciclocriacao.club
ambientcommunity.com
hzlubingaui.com
beltwaves.com
americanmadestrength.com
bleachedtiedie.com
pattycordeiro.com
shivshaktiipearl.com
signtosavelives.info
boozeshops.com
smarttreeservicecnc.com
hqxc.net
directadmissioncolleges.com
3503322.com
rimanchallenge.com
nikkihaleyfor2024.com
beststrategyforsellers.com
hedonize.com
hutai66.com
featurespeople.com
myprojectsstore.net
estudioiwg.com
yonihair.com
thejbnails.com
guozhaozhao.com
astrugar.com
crowdedclo.com
triplerb.net
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2704-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1824 set thread context of 2704 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 2704 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2692 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 31 PID 1824 wrote to memory of 2692 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 31 PID 1824 wrote to memory of 2692 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 31 PID 1824 wrote to memory of 2692 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 31 PID 1824 wrote to memory of 2704 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2704 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2704 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2704 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2704 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2704 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 32 PID 1824 wrote to memory of 2704 1824 a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe"2⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a258ac40b5c62c1ac1124ace071c69dd_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-