Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 07:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe
-
Size
488KB
-
MD5
16bd0c34e0f9a72a202bf8458e82eab4
-
SHA1
ca156b29a324d887bd5f68c9c7f5b24be3416a7f
-
SHA256
166e7b6c56c006f7336a286a7bff9844f25acb7d404b982afd32b83c885fa5fd
-
SHA512
b1621b37f3ed08c37be0f4ce336952c7f59997f2c52ffe4d51c7c17f4aab4b1af18f489d8361adbc0bff782bfd6e1d23956cd34cb9a6cf9419da08f07f038bb5
-
SSDEEP
6144:fGxhLyIr1v4d+jN9YmW/RFHXR6kHKqiWtQLnY2/h/SSs38RYFK9mKfHA:OdVu+jNyV/jHXskHKqQYuh/28RYFKl
Malware Config
Extracted
xloader
2.5
mc6b
packyssportsbarandgrill.com
catherinemata.com
swooningheartsenterprises.com
miss-notary86.com
applianceson.website
investormonks.online
lootproject.art
adoletakids.com
searchlink7.com
msjoyjewelsunlimited.com
dannisdolls.online
premierpor.xyz
geceseks.com
camdaw.xyz
ditrixmed.store
yotosunny.com
asdeformar.com
lacofood.com
nu865ci.com
verdantgomkte.xyz
bqric.com
answersystems-of-texas.com
obsessedwellness.com
herbalmedication.xyz
residemortgage.net
oruncorp.com
temeculasaints.com
feierabendshop.com
freeflowinitiative.com
inslidr.com
yhw86.com
dsrubicklon.com
xn--adcardpannage75-gnb.com
shopsalez.com
refaccioneselprimo.top
bay-frame.com
atiyehazaraein.com
memepaslhiver.com
ronas.top
schnurrstudio.com
aufablog.com
ruptuer.com
theplaintalker.net
greencrowns.net
archipelagos-labs.com
vitalflowscam.com
tenloe034.xyz
n0d.net
centelytics.com
sixfigureanalytics.com
monochromea.com
buyexcessinventory.com
ord12route.art
cursosparaavida.com
zhxinniang.com
localhuktoyof4.xyz
bcaslot88.com
raqsrecords.com
bestofomaha.info
geschauctions.xyz
fix4seo.com
saveescape.net
fizzlebu.net
tatteredfly.com
orderinformantmailer.site
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2580-7-0x0000000004490000-0x00000000044B9000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2580 set thread context of 2880 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 2880 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2852 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 31 PID 2580 wrote to memory of 2852 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 31 PID 2580 wrote to memory of 2852 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 31 PID 2580 wrote to memory of 2852 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 31 PID 2580 wrote to memory of 2856 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 32 PID 2580 wrote to memory of 2856 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 32 PID 2580 wrote to memory of 2856 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 32 PID 2580 wrote to memory of 2856 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 32 PID 2580 wrote to memory of 2880 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 33 PID 2580 wrote to memory of 2880 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 33 PID 2580 wrote to memory of 2880 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 33 PID 2580 wrote to memory of 2880 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 33 PID 2580 wrote to memory of 2880 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 33 PID 2580 wrote to memory of 2880 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 33 PID 2580 wrote to memory of 2880 2580 JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe"2⤵PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe"2⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_16bd0c34e0f9a72a202bf8458e82eab4.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-