Analysis
-
max time kernel
64s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe
-
Size
382KB
-
MD5
29e7355c628a7a78b16352716e91478e
-
SHA1
d0df5f3c5ee365066bd33bedf21da2ea2648ea80
-
SHA256
88bb9d0ecb52c0d5a024287caa7bdf03502ed536728988e6af7290399c873cb4
-
SHA512
70138973df0675cb7a6323e0bbf9387edaa129df084c7a562cd6da4adebb8dc552d33c69e2367b36397e7961051da6cc434ac5bf35d17cbfb1592386297fbfc5
-
SSDEEP
6144:NglMHyakSXOssSlPJwHq5N1/th1qCr+nVqXPovMtkGyMLgFLz+ycl1banWtx4kW:NgyZZlkq5NHhgDnkXVpLaX+
Malware Config
Extracted
xloader
2.5
u4an
charlottesbestroofcompany.com
gxzcgl.com
easyprints.xyz
hitmanautomation.com
play-to-escape.com
beansmagic.com
lianxiwan.xyz
nuhive.net
whystake.com
n6h65.online
emergencyprep4cast.com
peolinks.com
8ls-world.com
tezportal.net
trych.net
bathrobeconnection.com
quinnwebster.top
sagarmakhija.online
ladiesgossiping.com
400doultonct.com
anitaeichler.net
zaibuxi.info
cateringfrenchcroissant.com
iblispk.art
area-arquitectos.com
iptechcm.com
earthnodeone.com
yhomggsmtdynchb.store
movingcompanybaltimoremd.com
na6jzt.com
solarpanelsforhome.net
krnlfree.com
institutosamar.com
only-dieta.store
shieldhero.online
booklibrarypdfapp.icu
solidhelp.net
bearmarket.party
billysboots.com
pyuaetr.com
pizza-mio.com
merchantcentergroup.com
branchwallet.com
multicoininvestment.com
gzruohong.com
doomfishingtackle.com
eryamanescortbayan.xyz
tunetel.com
rhccateringevents.com
monamodda.com
horsmon-merchandising.com
sharkhostlive.com
petersonmovingco.com
forinfodunia.com
theseattlenotary.com
nyc-lavage.com
tes5ci.com
dunedinhyperlocal.com
myntlaccount.online
vehiclegraphicstoronto.com
alexarts-tortenmanufaktur.info
empresaimperfeitors.com
oinfoproduto.com
mdjrhyp.com
wwiilive.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/560-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1680 set thread context of 560 1680 JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 560 JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1680 wrote to memory of 560 1680 JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe 30 PID 1680 wrote to memory of 560 1680 JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe 30 PID 1680 wrote to memory of 560 1680 JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe 30 PID 1680 wrote to memory of 560 1680 JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe 30 PID 1680 wrote to memory of 560 1680 JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe 30 PID 1680 wrote to memory of 560 1680 JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe 30 PID 1680 wrote to memory of 560 1680 JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_29e7355c628a7a78b16352716e91478e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:560
-