Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 23:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b3976225591d2e9deb13be0795244849.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b3976225591d2e9deb13be0795244849.exe
-
Size
378KB
-
MD5
b3976225591d2e9deb13be0795244849
-
SHA1
e20462cc6735566609e86776cf7337e1c80046e5
-
SHA256
586401acc75a4f5399beb0d716ccb5ed0fe05e18aeeaa99fef61fd02d6d63389
-
SHA512
fc7af62818ae3792e26f515eed2f741924ad18439e9aba88618637a421cff970a52765d3794e200e564e0a0843c7ad4f752157146b2609a0b7be8a7acba1e363
-
SSDEEP
6144:ckkdR5XT4Uxk+hN9n3GDlEUyl6SHGYwBP5cK/sFW8E4KSJJ35zR+b:ckERpCCnOfylGxOK/schOzs
Malware Config
Extracted
xloader
2.5
p4qi
muhaart.com
sherwoodrummages.com
asw2utha4l.com
circularsmartcity.com
moebellueckoff.com
bodeguitayolo.com
schotinderoos.com
brandianext.com
shanxichangyou.com
metaversecake.com
fiyatsepetim.com
14ideedumois.com
brillenglas-experte.com
evoprostaf.online
dewaynehotline.com
jadeshelf.com
odhlzujfgl.com
babyboybarozzini.com
inndev.digital
slywnk.com
dreamsolutions9.com
propertiesthane.com
firmecamisas.com
evotec-de.com
shoprabito.com
theadminchronicles.com
newmexicotruckwrecklawyers.com
akibul.net
gemwrld.com
11dgj.xyz
divasdesign.com
id8e.com
diysportsart.com
zerotocloudengineers.com
goodhearttherapy.info
aaagoforthplumbing.com
thepostres.online
freespirit-eyewear.com
rasasolutions.com
sbsiamproduce.com
truaimail.com
beloved.guide
unitywerks.com
bjhwky.com
927341.com
vegalianrestaurant.com
am-mails.net
truemixing.com
lunchreaders.com
atpmej.com
wecuxs.com
surgerypklfdf.xyz
greenenirvana.com
dishsolid.club
lygnljd.com
hamiltonvip.com
harubo.com
dansstartupoffer.com
m33ko.xyz
pferde-vitalsysteme.com
streamcottage.com
duiqx.icu
inoutinsurance.xyz
ksesha.online
abdomenatskch.online
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/452-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1056 set thread context of 452 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b3976225591d2e9deb13be0795244849.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 452 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 452 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1056 wrote to memory of 3164 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 96 PID 1056 wrote to memory of 3164 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 96 PID 1056 wrote to memory of 3164 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 96 PID 1056 wrote to memory of 452 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 97 PID 1056 wrote to memory of 452 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 97 PID 1056 wrote to memory of 452 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 97 PID 1056 wrote to memory of 452 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 97 PID 1056 wrote to memory of 452 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 97 PID 1056 wrote to memory of 452 1056 JaffaCakes118_b3976225591d2e9deb13be0795244849.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3976225591d2e9deb13be0795244849.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3976225591d2e9deb13be0795244849.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3976225591d2e9deb13be0795244849.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3976225591d2e9deb13be0795244849.exe"2⤵PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3976225591d2e9deb13be0795244849.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3976225591d2e9deb13be0795244849.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-