Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 15:21
Static task
static1
Behavioral task
behavioral1
Sample
ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe
-
Size
312KB
-
MD5
ec234effdb4a0bf8257f2bb41fd784aa
-
SHA1
7fce8adcb4821ba20ac33520f0c4f4690d258f75
-
SHA256
94ab46851c076f66017869f7ac4a50f9225e688d894010110fcd4839f138b949
-
SHA512
f44777c79fa8edb8d7b8beef91005d9cb08ca77950e54aff39c397f04d47d6fb2b5b89bfa4b98f2f44ce0d4a0ffb5342f2c98c4e43acc964e57643a6011a0673
-
SSDEEP
6144:3+9boAXQe4AUF8oI9cAiDFNCVdKrLt2J8L:apUF81cAACi/t
Malware Config
Extracted
xloader
2.3
att3
oakbridgefundservices.com
fancyforts.com
coisadoce.com
learnfrommymentor.com
digitalgurughana.com
phk0.com
jantiprojeekspertiz.com
xiabyhuc.com
todayonly8.info
pgzapgmn.icu
sistemasarafranco.com
nest-estudio.com
2259.xyz
kenobi.tech
mortgageloansbyjeff.com
thameensa.com
navigators.digital
ecocleanmalta.com
advancedrecyclinginc.com
pmotriz.com
rjb355.xyz
theharbour1217.com
videomarketing.tips
quisroyalfactory.com
megatexxas.com
seedmanusa.com
niewiederpickel.net
dfhgiushds.xyz
womenshealthnewyork.com
mbhbuyingguide.com
cnaiyouyue.com
starcityrealty.homes
prepspiritwear.com
closingdesk.net
reintegrated.education
thedovaway.com
kutasureblue.com
arkhuman.com
iloverealstate.com
eating4mentalhealth.com
touchnoc.com
astrofriedchicken.com
wateristore.com
chloeallgeyer.com
herobet147.com
en-bmw-basvuruformu.com
otherneeds.com
chanek4.com
vn7snuk25.xyz
bifboawdq.icu
gofshoes.com
spartaplus.com
msmilkoskythemathematician.com
clublacey.com
visionchief.com
bestrefractor.com
newshopyou.com
theratesentinel.com
cunerier.com
theaustinsandalfactory.com
cisticron.com
bayhypesf.com
spanenter.net
loveofficial.net
travelscappadocia.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2940-38-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sysapp.exe PowerShell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sysapp.exe PowerShell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2128 set thread context of 2940 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PowerShell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2940 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 2508 PowerShell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe Token: SeDebugPrivilege 2508 PowerShell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2508 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 31 PID 2128 wrote to memory of 2508 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 31 PID 2128 wrote to memory of 2508 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 31 PID 2128 wrote to memory of 2508 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 31 PID 2128 wrote to memory of 2940 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 33 PID 2128 wrote to memory of 2940 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 33 PID 2128 wrote to memory of 2940 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 33 PID 2128 wrote to memory of 2940 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 33 PID 2128 wrote to memory of 2940 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 33 PID 2128 wrote to memory of 2940 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 33 PID 2128 wrote to memory of 2940 2128 ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell" copy-item 'C:\Users\Admin\AppData\Local\Temp\ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sysapp.exe'2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec234effdb4a0bf8257f2bb41fd784aa_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-