Analysis
-
max time kernel
95s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 02:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe
-
Size
481KB
-
MD5
853ef1dd6f3f39f1cb4730d5b4c92788
-
SHA1
d21e15ce6e8792f4f643601d1ad1173c87e882be
-
SHA256
03bef4cce37594b14884c28536f8247413f51286388528e6f0c6c6de27106cde
-
SHA512
d5f17a2c0d920a843e21a60598080b801acbe966226debd25016651192853c38ca8091a620d328d0c48de31139136a2327cb1fbb9f12821c079e834120b4a50e
-
SSDEEP
12288:M1nTXR0DY3UKZ9nBkOCOaw30ChpYzVEfFn+rzh1TqvX9slNVH9f3gWo84y626L/T:cnzjqo3j
Malware Config
Extracted
xloader
2.5
g2pg
xzq151516.net
ijournaltnpasumo5.xyz
hoclconsultantions.com
orcasdefense.com
businessvalues.online
popkidscollection.com
xn--sargelinemlak-59b.com
filmschool.asia
yalding.com
az-property-solutions.com
dnahotcars.com
cunnters.com
rkmuscles.com
artshowespelhos.com
tagfat.online
kenganashura.net
ayelenpsicologa.com
hotelmipetate.com
etuwrestling.com
von-wehner.com
stronghal.com
codigocentro.com
coralshelf.com
ff4c7x0gm.xyz
fbsp3.xyz
climatecheckin.com
pressonnailsie.com
xenosapiens.online
maslsk.com
hotelapril.net
john-way.com
mautsard.com
alishamerritt.com
iphone13promax.review
attaqwa.store
o594666.com
vantio.net
wenhaitingtao.com
civilherald.com
angelaporterward.com
snulya.com
fanzerkalo.online
flexghost.xyz
contactcenter3.email
zaproszenie-banku.xyz
ouridoo.com
riverhills.biz
ys2m.com
jdm-s.store
bucksplit.com
scissorsmovie.store
makeup-first.xyz
lovarebtoyof5.xyz
hackensacklegal.com
bgsp3.xyz
louisebeckinsale.net
drachmacoins.com
photographersblueprint.com
wastronature.com
osunconcepts.com
rednacionaldejueces.net
homeofficelist.com
mingshan888.com
etiketlabel-reserveren.online
boitecfermenti.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4736-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4376 set thread context of 4736 4376 JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4736 JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe 4736 JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4736 4376 JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe 99 PID 4376 wrote to memory of 4736 4376 JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe 99 PID 4376 wrote to memory of 4736 4376 JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe 99 PID 4376 wrote to memory of 4736 4376 JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe 99 PID 4376 wrote to memory of 4736 4376 JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe 99 PID 4376 wrote to memory of 4736 4376 JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_853ef1dd6f3f39f1cb4730d5b4c92788.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-