Analysis
-
max time kernel
92s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 05:30
Static task
static1
Behavioral task
behavioral1
Sample
fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe
-
Size
737KB
-
MD5
fa4940b0a236ff804f909c42b965572c
-
SHA1
aea87158e10ca3fe2e44cc51bad5b92bf86c8605
-
SHA256
f6ca5975931a975e167e665863ba4ae3be48db585117bad6d4eb833fae8491cd
-
SHA512
8c611dd5cd481c1e1df1afc95b375677976268f4677969fe3c99e66f624f5f6354406688882df45796567b1a14ef83cabda8a8522c8c8a0fa1fd18a6c2b9b526
-
SSDEEP
12288:HjYTVR4/R6WGZEaDDomXa/ZoN+Zxh/IGvBpt9VjW:HjjRRXgMm2oN+Zx9dvBp3VjW
Malware Config
Extracted
xloader
2.5
cuig
sofiathinks-elderly.net
lahamicoast.info
2shengman.com
cbsautoplex.com
arcana-candles.com
genrage.com
kukumiou.xyz
thequizerking.com
sonataproductions.com
rebuildgomnmf.xyz
ubcoin.store
yiyouxue.net
firstlifehome.com
mdx-inc.net
gotbn-c01.com
dinobrindes.store
jcm-iso.com
cliente-mais.com
mloujewelry.com
correoversoi.quest
rc-rental-housing.com
swisstrustcitybank.com
traderjoes-corp.com
mandolinmeditations.com
kathcorp.com
mcdonaldsfastdel.xyz
nielsqanalytics.com
bansity.com
mimosymas.com
atp-cayenne.com
sinterekes.com
nnxsk.com
shushigallery.tech
thgn41.xyz
resporn.tech
growingki.com
themyopiatoolbox.com
angeleyesevents.com
reddishgomjtd.xyz
amazonretailbrickandmotar.net
jewelrybyjma.com
ctroutdoors.pro
357961.com
theakfam.business
skincarefamily.com
xptoempeendimentos.com
tapestrirewards.com
viridilodge.com
bostondowntownrealestate.com
disrepairclaimsuk.com
makaroff.net
thedoublezbar.com
barbicidemalaysia.com
sliv-a.online
showgeini.com
martialartsreigns.online
metamode.space
ch95516.ink
halvorson-pickup.com
mizuno-trouble.net
46dgj.xyz
esylf4vt.xyz
chopaap.com
igorleonardo.com
qtih.top
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4416-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2736 set thread context of 4416 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 4416 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 4416 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2736 wrote to memory of 4416 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 91 PID 2736 wrote to memory of 4416 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 91 PID 2736 wrote to memory of 4416 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 91 PID 2736 wrote to memory of 4416 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 91 PID 2736 wrote to memory of 4416 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 91 PID 2736 wrote to memory of 4416 2736 fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa4940b0a236ff804f909c42b965572c_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-