Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe
-
Size
465KB
-
MD5
ddafa2b44ec908b114a4c33431e0952a
-
SHA1
e85c3f28cd859c6b5ab900c6a0c07a8fcfde8173
-
SHA256
4ca6a48021d7d442d9311b158691b1f219576d7d37a99f64741463659903ad4c
-
SHA512
4a3e227d44ad1cd9d6402e3bbde1ecc51196a7d8325f808bd6ba05059a6f596edf82f0ce2b359daa61267f6fcd08dc994549a6b06aec0cda1480ec14ab3efd87
-
SSDEEP
6144:UEuRQAx7F0oJbIkfS6yLURmB2kC1iQvOhWfVqh9HZZzALTfj9H7C80kDq8a5O+F:Y+Ax7DJ69251VYWfVgH837e6AFzdp
Malware Config
Extracted
xloader
2.3
weni
sdmdwang.com
konversationswithkoshie.net
carap.club
eagldeream.com
856380585.xyz
elgallocoffee.com
magetu.info
lovertons.com
theichallenge.com
advancedautorepairsonline.com
wingsstyling.info
tapdaugusta.com
wiloasbanhsgtarewdasc.solutions
donjrisdumb.com
experienceddoctor.com
cloverhillconsultants.com
underwear.show
karensgonewild2020.com
arodsr.com
thefucktardmanual.com
712kenwood.info
telecompink.com
ebizkendra.com
kitkatmp3.com
utformehagen.com
profitsnavigator.com
kathyharvey.com
tongaoffshore.com
vrpreservation.com
hy7128.com
nicolettejohnsonphotography.com
rating.travel
visualartcr.com
nationalbarista.com
lovecartoonforever.com
koimkt.com
directpractice.pro
blockchaincloud360.com
queverenbuenosaires.com
coachmyragolden.com
awree.com
facebookipl.com
rcheapwdbuy.com
trinspinsgreen.com
voxaide.com
ecorner.online
mattvickery.com
regarta.com
fknprfct.com
theessentialstore.net
sunilpsingh.com
ovtnywveba.club
optimalgafa.com
awdjob.info
humachem.com
southeasternsteakcompany.com
centerevents.net
warrenswindowcleans.co.uk
lebullterrier.com
thecxchecker.com
formerknown.com
pupbutler.com
tincanphones.com
tgeuuy.cool
panyu-qqbaby.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/348-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 384 set thread context of 348 384 ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 384 ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe 348 ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe 348 ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 384 ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 384 wrote to memory of 348 384 ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe 91 PID 384 wrote to memory of 348 384 ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe 91 PID 384 wrote to memory of 348 384 ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe 91 PID 384 wrote to memory of 348 384 ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe 91 PID 384 wrote to memory of 348 384 ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe 91 PID 384 wrote to memory of 348 384 ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:348
-