Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 11:50
Static task
static1
Behavioral task
behavioral1
Sample
d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
d24fc8737f2e7f453fe3688ac4c39736
-
SHA1
dc7b7a4ba33610500900d76e871523c2d1fb9f65
-
SHA256
f554af43cf1397d00309fdb967a62a825f4cf06100bab5e8fff17a9faa56d0f7
-
SHA512
a9c49f600277f40800036208c57e81cc844bab33f1860fbe0162f75a2d2c2574b9d3a987c996e9b793e1071b9663f69bdf3322036ee71e8935778be96a7086fd
-
SSDEEP
12288:ReaRNdAHjDJW7nUyeSqffN8Yj1pmjEd53kJSr1sRYAT2fXkk/HmUVpmldEVRCG:RnR8HmfqfV5jyjEd5OYAT2fXkvOH
Malware Config
Extracted
xloader
2.3
earz
halacoupon.com
anthos-labs.com
hagertylabs.net
l1992.com
856379580.xyz
rcbb-technologies.com
realhoggapparel.com
sauceprince.com
tootingcab.com
4chase5.com
ordergogibibimbap.com
nyj.xyz
dermixspa.com
premiergiftingco.com
razorcentric.com
mbrealtyadvisors.com
officialjazz.club
cctv006.com
hbcuatthepolls.info
prestamos-ya.com
braara.com
yeetgolf.com
lecotonrose.com
cjmakeupartisttx.com
erdhardt.com
talasaz.com
battisonsemtech.com
kblzs.com
educatemyemployees.com
goodgame1.com
graxdev.com
retirementparner.com
oakdalecasino.com
patsoases.com
thebiodetonators.com
bomachinaconvention.com
bett3r.com
2ug35refd.com
wholesalekingsauto.net
welcomeenlighten.club
woman2watch.com
retireemedical-tagcomet.com
astudentdevelop.com
cryptocaviar.com
tedstone.info
racevc.com
eogrlqf.icu
glamourousglory.com
vfb2020.com
hudsonvalleyproject.com
learningtolive365.com
createspace.sucks
kaojinwolove.com
pureandrich.com
textenvsschreiben.com
devis-danseuse-bresilienne.com
nidape-cfm.com
johnnyfong.com
thehappymoose.com
ldq.cool
capdistribution.pro
khangkhilinh.com
biomonde-dannemarie.com
sterlingrhone.com
furnitureizmir.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2528-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3004 set thread context of 2528 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 2528 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2752 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2752 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2752 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2752 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2532 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 31 PID 3004 wrote to memory of 2532 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 31 PID 3004 wrote to memory of 2532 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 31 PID 3004 wrote to memory of 2532 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 31 PID 3004 wrote to memory of 2528 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 32 PID 3004 wrote to memory of 2528 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 32 PID 3004 wrote to memory of 2528 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 32 PID 3004 wrote to memory of 2528 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 32 PID 3004 wrote to memory of 2528 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 32 PID 3004 wrote to memory of 2528 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 32 PID 3004 wrote to memory of 2528 3004 d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe"2⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe"2⤵PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d24fc8737f2e7f453fe3688ac4c39736_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-