Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
c7cda00215a9747d2a6142919bd45227
-
SHA1
5ee0b659b29646b01f40eb89c38f63f96dac9978
-
SHA256
38b7a5626e00ff148782f6726d11dfabee44922c40bac65a09eaf0b2a44e4c65
-
SHA512
0a23839e0cec26331e281204b89499fceeed10284cc8913889c9fcaf9109c74ff56405445d63cf4ad29c6b8a94fcb864340146124ceef9f8111f7f1a5d1191d9
-
SSDEEP
12288:ipKqKvbIzrjF/Tzacdea0At2J6oSYKBgwJYtXt93IiT2fXek/HmUVpX69EV4lm:ipKFjIVzPeaJvZLYtXt95T2fXevO9
Malware Config
Extracted
xloader
2.3
i7dg
bj-htst.com
christiandavidcreates.com
boozypints.com
climatetechventurestudios.com
kefconcierge.com
shoplasero.com
privacybydesign.digital
irenehigginson.com
derxikx.icu
connorcartledgerock.com
gtja899.com
boloblo.com
marquesdecuernavaca.com
montascaleofferteinfosit.com
blun33.com
24sc.net
equalaccesswebsites.com
bschgjs.com
wqfilter.com
o72lab.com
ddong2.com
panteracapitalvc.com
chiefbrief.com
wildmountainweed.com
keenelandracebook.com
isthisautomation.com
gnnxs.com
japanesexxxvideo7.com
shallowlakes.net
massageshanghuntsville.com
rachelburgin.info
travelproprietor.com
thebandagedresses.com
o8nholding.xyz
xilomo.xyz
properassay.club
kentuckypaymentrelief.com
heatgemini.com
puttlikeademon.com
moeorless.com
s4nxnkfix84wp.net
hippopotamus-consultation.com
bethsfashiondestination.com
e-servr.com
samwhaeocr.com
stranded.xyz
lunariaturkey.xyz
abit.store
1970quilts.com
terapiafamiliarasturias.com
theleedongreen.com
veganranchdressing.com
algoswipe.com
thepropertyjunction.com
smokestop.site
iberiafm.com
the-s-cinder.com
nextclintrial.com
numberswizards.com
explodingprofits.com
centralmachineworks.com
beerdominant.com
fvckshirt.com
spiceyourfood.com
pdam-lebak.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/1976-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1680 set thread context of 1976 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4112 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 1976 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 1976 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1680 wrote to memory of 4112 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 99 PID 1680 wrote to memory of 4112 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 99 PID 1680 wrote to memory of 4112 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 99 PID 1680 wrote to memory of 1976 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 101 PID 1680 wrote to memory of 1976 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 101 PID 1680 wrote to memory of 1976 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 101 PID 1680 wrote to memory of 1976 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 101 PID 1680 wrote to memory of 1976 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 101 PID 1680 wrote to memory of 1976 1680 c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dGLrjEWnv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp858.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7cda00215a9747d2a6142919bd45227_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56bf397181b582ee44bae8d811e1fd26b
SHA171e2611f6f0e3a0d45b07dbe12abe0de98211bf9
SHA2563cbeb0fa55babcb00b557283dbfbee0289276af1998fbc41a0cb24da2ac8f998
SHA5122fe0a498ad4f764662e95662977d37cb2f5d37167f97959afdf0359cb2466f7524d8c0de26282d1e8e90d0438bddd06e32242cdc9f91e6a53e5dd90a910cf51b