Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 06:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe
-
Size
490KB
-
MD5
129f508d53cfffabad90273bd81fe944
-
SHA1
6bdc258e300a42bcb84dc07db789ec1ff5469bc7
-
SHA256
6c30a892d816d8bd1dff82f0f32629e995222ef64abe420c34e9ba74cde5765f
-
SHA512
76d11f458a8a533e1caa5687435559feecc378a1fb933d418f2ebfeee932239053d2e8d4b515dba4f30595704d1771ba509f26d8caf0424684a3c807daa49154
-
SSDEEP
6144:1GxhLwIa+v2TgTxWyYZW2uPxJgpjt61mAKc4WzJCZNozJztm:0ftwgTx2W2upJgVmBKuzggtm
Malware Config
Extracted
xloader
2.5
n8cr
mainponsel.com
twdesignacreation.com
obsidianfields.net
biologik.education
australianmeatandwine.com
metaverse360.biz
tenlog034.xyz
retryb.com
darbodrum.com
ouranos.xyz
equityreleaseshelpukweb.com
buck100.com
cfip-plongee.com
sundindustrial.com
godigitalwithpavitra.com
exodiguis.com
ncxogt.com
medyncity.store
bseafacepharma.online
dellmoor.com
thesaltandpeppercompany.com
salvationshippingsecurity.com
quarhu.net
isearchpartner.agency
mistikistapp.xyz
cfinvestmentsllc.com
istesdesv.xyz
lsurpriseremix.com
kirtansangeet.com
faceandco.clinic
189montreal.com
xn--tlq41iy6p.xn--czru2d
aestheticgeneration.com
pharmasolutionspr.net
rab.bet
lifeultimatejump.rest
mygreatsport.com
wwwinnovativeinteriorssdcom.com
alexchen032104.com
tatabet999.com
makeithappenshow.com
javcricket.com
dangkytrasauviettel360.club
radiesn.store
kreditkarten.center
iran-style.com
onhering.com
0e6.biz
insurancewineappraisals.com
stadichigh.com
denim-dots.com
finehedge.com
kcs-food.com
dashmints.com
recifetopschoolteacher.com
harryrowlandart.com
thearton.com
whatyummy.com
cockblocker.online
idf2000.com
hotdog-dsk.com
aardvarkbutter.com
tykazz.com
lbsp3.xyz
karasevda-jor.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2848-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2848-14-0x0000000000770000-0x0000000000A73000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1224 set thread context of 2848 1224 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1224 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe 1224 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe 2848 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1224 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2848 1224 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe 31 PID 1224 wrote to memory of 2848 1224 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe 31 PID 1224 wrote to memory of 2848 1224 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe 31 PID 1224 wrote to memory of 2848 1224 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe 31 PID 1224 wrote to memory of 2848 1224 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe 31 PID 1224 wrote to memory of 2848 1224 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe 31 PID 1224 wrote to memory of 2848 1224 JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_129f508d53cfffabad90273bd81fe944.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-