Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
ada9f3fef02806076da84b549a873261_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ada9f3fef02806076da84b549a873261_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ada9f3fef02806076da84b549a873261_JaffaCakes118.exe
-
Size
293KB
-
MD5
ada9f3fef02806076da84b549a873261
-
SHA1
1a215556d81e885d9b179dc46d037742d047b72b
-
SHA256
dedfb7f92808e48feb04d401fdd7cac5f4951c1e6b31601f1b901f894d29398d
-
SHA512
e664dfe09736bb22606b990493d8066caacc8727401a2c03f350a3044e86615b2609ffc41e16ee8da0f8f103a03cc57bcb74127f1441580f5a97c683cca419e2
-
SSDEEP
6144:A0fSeECNROmftNgyBxJy97rmvFZJf1VcrWRY5Jo2CSExtzva9Yua6:FKeElmngyBxq7KvFffUrWR8KxE9Y0
Malware Config
Extracted
xloader
2.3
uo4x
justinlocke.design
integrauy.com
veganoandorganico.com
solisdq.info
kitchentoolhouse.com
essencejanay.com
faithfultruck.com
marketplace-73837233.com
bimadesigns.com
confussekd.com
aadamslovingheart.com
abdulsalamyafi.com
leticiamagalhaes.science
myrootsandtrees.com
thewickedwafflestick.com
wanakamotelnz.com
driveerb.com
trenchng.com
tarantocapitaledimare.info
vipmallorcamanagement.com
jlquanfeng.com
dar-mali.com
bridgerealtycapital.com
windypinesfarm.com
vibatomy.site
nicholasgachkar.com
businessimagine.com
justfarenoughfarms.com
rosellamodel.online
lelexstyle.com
sheboyganshore.com
rebenochek.com
braecopy.com
thebasicspro.com
danieljasonfry.com
ozhanbilgisayar.com
authenticstore.info
briggsboxingacademy.com
contractortarget.com
jbdespacho.com
davidnewtonguitars.com
barbarabarbella.com
myfavoritelash.com
nordictrolls.com
doubleought00.com
uddistribution.com
novaxcovid.com
xpress-x.com
autocreditmonteregie.com
proveedorde.com
norcalswish.com
fourgolden.com
facebo9.com
yesetut.com
tricitieshandyman.com
myshowmusic.com
sourcescrow.net
fashionmoe.com
bbcontractingpros.com
parkppl.com
pimcusa.com
hegsfy.com
sellerloco.com
parentsconstruction.com
girisimcilikveinovasyon.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2716-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2160 set thread context of 2716 2160 ada9f3fef02806076da84b549a873261_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ada9f3fef02806076da84b549a873261_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2716 ada9f3fef02806076da84b549a873261_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2160 ada9f3fef02806076da84b549a873261_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2716 2160 ada9f3fef02806076da84b549a873261_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2716 2160 ada9f3fef02806076da84b549a873261_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2716 2160 ada9f3fef02806076da84b549a873261_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2716 2160 ada9f3fef02806076da84b549a873261_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2716 2160 ada9f3fef02806076da84b549a873261_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ada9f3fef02806076da84b549a873261_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ada9f3fef02806076da84b549a873261_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\ada9f3fef02806076da84b549a873261_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ada9f3fef02806076da84b549a873261_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-