Analysis
-
max time kernel
95s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe
-
Size
714KB
-
MD5
aefb9f928342314fa3c9770f8c791bdb
-
SHA1
3ab53f4b26ed0cf003b2a51a12993704c966af7a
-
SHA256
42f97b9ed8552542b2d93ee6c79bba2673b8b56c574bd9f30fbdf23e86b94596
-
SHA512
701ea6820d5d1bb2f05e5de38a388078facd9048d66ae6986a139ee7ebf383fe2ea3864eae963c7a3c243d6c155343f839489411298b5147795dde2297534c2c
-
SSDEEP
12288:ll7D72iNeHK7z+FLathlpCXnmiCDcmMwKtyMs1JnmS6+VLFDA6llIL7307R5:ll7n1bIEhbCXnBmM1tyMyJnt6+TM7kR
Malware Config
Extracted
xloader
2.3
u3r5
alashan.ltd
demopagephequan.online
garxznql.icu
unetart.com
dajiangzhibo15.com
influencer.fund
beverlyhills.city
strefafryzur.net
giftboxhawaii.com
ecotiare.com
homeandgardenradioshow.com
sageandsandco.com
laflesoley.com
icipatanegra.online
autovistoriapredial.net
xn--polenezkypark-pmb.com
cbdamic.com
aaronandmarissa.com
datasoma.digital
theclosetology.com
seemajindal.com
smartphone-digital.com
mldarby.com
ljhlwyy.com
racevc.com
aritailor.com
neuromemebook.com
zpnfoslqyshplulrkycalmor.com
123movie.review
enisis.info
thecalligraphyguide.com
confirmcarousel.life
djaystransport.com
joyful888.com
realmarketingtools.com
greensstrings.com
rhinohealthnews.club
daonedu.net
everythingfinesse.com
vitalgiant.com
youhodlwr.com
originalownersonline.com
testci20200827122104.com
japanmatrix.xyz
bodybrush-shower.com
careinnovationsummit.com
thefreakypeach.com
houstoncupcakes.com
medisola.xyz
taconicsearchmarketing.com
parcclematis-newlaunch.com
zhongshengzhenzhi.com
txdv-scmcz.xyz
buy-colorado.com
membership.site
amirbakhtiar.com
healthonours.com
tanja-wittk1975.com
gemaylola.com
inpursuitofmyfirstlove.com
advantagebusiness-solutions.com
modernlegacyacademy.com
psuscience.com
wakumo.store
cumhuriyetcidemokratpartisi.kim
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3708-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3660 set thread context of 3708 3660 aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3708 aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe 3708 aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3708 3660 aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe 100 PID 3660 wrote to memory of 3708 3660 aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe 100 PID 3660 wrote to memory of 3708 3660 aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe 100 PID 3660 wrote to memory of 3708 3660 aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe 100 PID 3660 wrote to memory of 3708 3660 aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe 100 PID 3660 wrote to memory of 3708 3660 aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aefb9f928342314fa3c9770f8c791bdb_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-