Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
c26f3b3d84405eea3ab95b69f7e5a389
-
SHA1
38a81de45ed4b1c4c84c89c2fd7d5b2334d85b05
-
SHA256
74829b780f8a868740f974a08c4a89aacbf293671b189a7f773b41651e004c9a
-
SHA512
3a004be5a242af6648f0dc03e85d49d6042a3d91a20043c3315e616d3a30b1ccddd588d94a3f569e54ba9e15f3c878bc66ad17e41dad7178514f30d5e9d4ab0b
-
SSDEEP
12288:Oh5E394sjPBi/7Ui9rI9jGoaft/VEMv/ZkkDOEVTQ6H1Uy1Susr8MmH3jr:FKo8UimctdEA/ZkcemZS5R0
Malware Config
Extracted
xloader
2.3
uisg
editions-doc.com
nbchengfei.com
adepojuolaoluwa.com
wereldsewoorden.com
sjstyles.com
indigo-cambodia.com
avrenue.com
decaturwilbert.com
tech-really.com
kimurayoshino.com
melocotonmx.com
njrxmjg.com
amandadoylecoach.com
miniaide.com
kocaeliescortalev.com
ycxshi.com
f4funda.com
126047cp.com
projecteutopia.com
masksforvoting.com
indi-cali.com
ingam.design
theneighborhoodmasterclass.com
brandstormmediagroup.com
soothinglanguages.com
msmoneymaximiser.com
yduc.net
daniellageorges.com
lvaceu.com
institutoamc.com
hare-sec.com
asd-miris.com
beton-9.com
morehigher.com
cobblestoneroads.com
falhro.com
skincaretrial1.info
insideajazzyminute.net
loginforce.com
alluviumtheater.com
forevercelebration2021.com
wajeofxcv.com
ycshwhcm.com
rustyroselondon.com
forestbathingguru.com
gourmetemarket.com
dna-home-testing.com
assaulttrucking.net
nourgamalyoussef.com
soujson.com
sorelsverige.com
tandooridhaba.com
hypovida.foundation
iregentos.info
bjornadal.info
okdiu.com
857wu.com
3g54.club
xfa80.com
betxtremer.com
autominingsystem.com
ilcarecontinuum.net
eventualitiesofcrime.com
bst-gebaeudereinigung.com
makarimusic2020.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3924-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3332 set thread context of 3924 3332 c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3924 c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe 3924 c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3332 wrote to memory of 3924 3332 c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe 99 PID 3332 wrote to memory of 3924 3332 c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe 99 PID 3332 wrote to memory of 3924 3332 c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe 99 PID 3332 wrote to memory of 3924 3332 c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe 99 PID 3332 wrote to memory of 3924 3332 c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe 99 PID 3332 wrote to memory of 3924 3332 c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c26f3b3d84405eea3ab95b69f7e5a389_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-