Analysis
-
max time kernel
33s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 08:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe
-
Size
417KB
-
MD5
188a0c1b3179c00fa189e73b772dcd72
-
SHA1
efa12177184000acf7236187b9582ba204ac1387
-
SHA256
0997b2cc23e6aa9743c78ccaba88fb036bc03937011a12bbb367e6b457461c0b
-
SHA512
8feec5cadd9710eda47653eb26041c99b7915d5a664f90b9daabfddb65651be6161c9b21bece2943c8d8ae54a1ec44f6aaabbb1bd964791abe3cc020d771bad0
-
SSDEEP
12288:Awhxe47sMXuMCIy04qtaOhv+AlicO/xI/SbVJ50D805V:Aw3H7drCI4qtaK+Ali9e/SxJ50
Malware Config
Extracted
xloader
2.5
wogm
sub-dude.net
repeatcustom.com
goodspaz.com
sinagropuree.com
jyh8886.com
muescabynes.quest
stark.agency
nolimit168.com
hypermediastore.com
arab-xt-pro.com
gruppovimar.com
santamariamoto.express
affaridistribuciones.com
straetah.com
collectionsbyvivi.com
nalainteriores.com
weeklywars.com
insightmyhome.com
ucml.net
herderguru.com
sz-jialejia.com
xinglu56.com
tenselect.net
arepaspuesdc.com
cvkf.email
moseslakeapartment.com
chantaldesign.space
884651.com
yzyf88.com
seattlecanna.com
obsessive.company
blessedfurnitures.com
disparandose.com
smmakrygiannakis.online
buno8ce.com
javaportal.info
laoqu6666.com
portfolioinsidertips.com
workospbit.space
biocrafts.net
estebancantillo.com
appliancestar.xyz
gloriousbees.xyz
porchlightwoodworks.com
rawhoneytnpasumo2.xyz
pokipass-niigata.com
aodesai.store
powro.online
playin.one
minded-afoot.com
zpahura.com
bodybybetsy.com
camworker.cloud
mest2.com
chezlulu.paris
officeupdate365.com
jackdanska.com
glenndcp.com
huikanvip.com
connectedtoolstore.com
flogicpro.com
yourhomestimate.com
dogtraining5x5.com
truenettnpasumo2.xyz
eygtogel021.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2568-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2208 set thread context of 2568 2208 JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2568 JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2568 2208 JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe 30 PID 2208 wrote to memory of 2568 2208 JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe 30 PID 2208 wrote to memory of 2568 2208 JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe 30 PID 2208 wrote to memory of 2568 2208 JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe 30 PID 2208 wrote to memory of 2568 2208 JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe 30 PID 2208 wrote to memory of 2568 2208 JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe 30 PID 2208 wrote to memory of 2568 2208 JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_188a0c1b3179c00fa189e73b772dcd72.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-