Analysis
-
max time kernel
95s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 05:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe
-
Size
493KB
-
MD5
516d474f082a4b5278d13dbf8547d2b7
-
SHA1
1afddf79556b44091fffe8bcaefcf7945ad17a5e
-
SHA256
6acd5c9d1f204fc1af1d3e8a67578b3b2c6b58a76346b09efe2dd56a50c78d1b
-
SHA512
c7d79c0806e9b0caae453230e3a82a8dfe16ed62017f828f913fbff6b7cfbf5739fd911673f87315beb515af1a01ce6c8711023c1bba5d359144bcf48361e06a
-
SSDEEP
6144:XGxhLpLFI/3v1SE8CBcXVBdXlXx6lVo57lkkdIl+M8HoS:2ZiXpzcXVBdVBWo5xHhMso
Malware Config
Extracted
xloader
2.5
fi6a
shoeloans.com
paulsamaco.com
sustalnablels.com
talinwauchope.com
siniwali.com
mindblowingupdates.com
recbi56ni.com
agusdaud.com
api-28nnys.com
lrfinancialservices.net
toom.website
5555wns.com
macfolie.store
1866donaldwins.com
odontoelearning.com
61vr.com
moragaat.tech
ickejo.quest
kipkleen.online
bompshebomp.com
gasfillaustralia.com
limitedmail.xyz
sh-cy17.com
thedigitallaunchacademy.com
rawhoneytnpasumo4.xyz
av-yer-fill.com
sheepadoodlepupprogram.com
contentcreationbarwig.com
vuive.biz
ramotcentre.info
yyds9527.space
clinicaglobalmedic.com
tenlog008.xyz
filmsntvstory.com
hnjst.net
wwwjbo999.com
myfamilysecure.com
3mail.pro
caventanige.quest
crispshots.com
drayeshaafzal.com
businesstaxstrategy.com
noobwei.xyz
rehgom.com
dernemusaste.quest
abwda.com
cherrycreekww.com
tmrtg.com
awbnmnmammmamnre.top
myequipment4rent.com
stardomforkch.xyz
drms.agency
makaz.online
vorganiqa.com
epfpm-saadi.com
1h2.space
paulzimmerman.top
kitsq.xyz
dayandwallace.com
codefurry.com
1155uo.com
utahgunexchangegrizz.com
oatraining.us
creamv.today
annuodoors.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3092-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3136 set thread context of 3092 3136 JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3092 JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe 3092 JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3136 wrote to memory of 3092 3136 JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe 99 PID 3136 wrote to memory of 3092 3136 JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe 99 PID 3136 wrote to memory of 3092 3136 JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe 99 PID 3136 wrote to memory of 3092 3136 JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe 99 PID 3136 wrote to memory of 3092 3136 JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe 99 PID 3136 wrote to memory of 3092 3136 JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_516d474f082a4b5278d13dbf8547d2b7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-