Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 14:34
Static task
static1
Behavioral task
behavioral1
Sample
da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe
-
Size
930KB
-
MD5
da18fea88d35935c34972c6d2b532b4b
-
SHA1
5a0ceab83814ba09cf47eb32daf44651ac17cd61
-
SHA256
8c200639871626b76bf9c568cbb456a304730cffb072dbf8ae36df19db96ed05
-
SHA512
0c4ad8744a98cea89d103a9563e8c5875380467e9ce2472f4a81b67d3ec587840f3f70d006da70d6021bcc5c27f9815782186e0b9aa4d37fb762e08df877c89a
-
SSDEEP
12288:WZ3iF2iNeHK7zgzdQ8EjcqwqeXp+LUVxN3XYPCbzIziUV9ZRLsa3pEP7r9r/+pph:63a1bYEjpUg2tXuCbzCV7361q
Malware Config
Extracted
xloader
2.3
xcw2
expdallastx.com
vedanshhomoeopathy.com
ssmt66.com
echomc.xyz
myclarityplanner.com
abrosnm3.com
unitandrea.icu
dftuned.com
sbamilkingmachinery.com
lifesongmidwife.com
crepkonnect.com
reevoy.info
warisanoranglama.com
geotekmapping.com
eert.net
pcmajstor.com
32sj6dxrkx8pfp.xyz
zoomaconsultation.com
vinilikes.com
superbrandsstore.com
appbaidu.com
dias-agro.com
tenutesasimasardegna.com
orcharddryfruits.com
apollowang.com
mortgage941.com
tonechic.com
theseven-ups.blue
armopet.com
drive-skill.space
campbellrvs.com
kickasskeychains.com
vvipxx4.com
bestchoiceuc.com
votedeleon2020.com
sharsamcpa.com
yizddmall.com
stnup-ec.com
njhxcwzx.com
mjtaxrelief.com
raizesmarketing.com
manpasandmeatmarket.com
universalcustomframing.net
mathisbrothera.com
3790792.com
qykp-qzziw.xyz
catambra.info
gearchat.net
oilywaternews.com
mikizichy.com
sd956.com
l4sve.info
smallbusiness.review
newjerusalempictures.com
georgiahomesforless.com
winluxury.net
thepriceislight.com
aeonsjewelry.com
highticketsales.company
whelli.com
ecza-siparis.club
ajaylajworldcuisinesblog.com
thesmarterwaytosnack.com
kxd-led.com
coeurdaleneluxurylife.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/548-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4740 set thread context of 548 4740 da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 548 da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe 548 da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4740 wrote to memory of 548 4740 da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe 91 PID 4740 wrote to memory of 548 4740 da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe 91 PID 4740 wrote to memory of 548 4740 da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe 91 PID 4740 wrote to memory of 548 4740 da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe 91 PID 4740 wrote to memory of 548 4740 da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe 91 PID 4740 wrote to memory of 548 4740 da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-