Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 07:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe
-
Size
493KB
-
MD5
93593989c0bf9dd07f10428708ae5e0c
-
SHA1
a31973ef0dd9245bed87735455f0c80fef0b58eb
-
SHA256
7723b67e715aa24be6507ffeb2e964d46e20c6e3cfc687d31ddc02a651208eaa
-
SHA512
f0c907210428ced03bb2c1b4bc005bb776487df684b571ee87658680b78456e9c86999257fb577b0adeaae46b649d8c3598ebd026d7c7e941ca016b0f36afc8e
-
SSDEEP
6144:TGxhLlpnIZEvncNe/eUMX5wDgllnaAd8FU0Cu5koEkGAZEd7R1Ruw4qNDfbJ5B:StyKV/eUMX60ZRaU0Cako60qVKwDf/B
Malware Config
Extracted
xloader
2.5
g53s
kosnac.com
tujaso.com
handmadealtrimenti.com
txclaimsguy.com
newonedrivedocc.com
11t.xyz
shawnliang.tech
worldigger.com
lesgitar.online
winlanddepot.xyz
mofangxx.store
8ls-world.com
localrelics.com
piccadeliquickup.com
rhinogroup.online
hxrhorend.quest
avtfitness.com
oakabbey.net
presox.com
bluegreendi.com
noonshop72.com
terkyz.xyz
aerialnft.xyz
alskdfalskdf.com
kocaeli-digital.com
cerulean.media
sakthiadvancesystems.com
avielman.com
thechicentrepreneur.com
doralgomed.com
warehamcrossings.com
scotsafealarms.com
524571.com
shoppernft.com
narrativecontracting.com
bakirciticaret.com
moneythrust.com
hackthework.com
goldenversatility.com
mgav13.xyz
dp1game.com
rockalps.com
pinmagix.com
santahat.party
stoneequiprnent.com
qarandhis.com
moussevision.com
darlingdesignstore.com
gemutlichkeit.info
j497.com
pitch9.com
codingismining.com
dtmcard.com
fellasies.com
djdidinooeijduuji.com
freayabnnd.com
gaalli.xyz
mnselfservice.com
dkaobrand.com
tactical-resiliency.com
daltem.com
c23spfx.com
shopbonnetsbybri.com
xana-ana.com
anysignals.net
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2580-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2292 set thread context of 2580 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 2580 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2768 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 30 PID 2292 wrote to memory of 2768 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 30 PID 2292 wrote to memory of 2768 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 30 PID 2292 wrote to memory of 2768 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 30 PID 2292 wrote to memory of 2580 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 31 PID 2292 wrote to memory of 2580 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 31 PID 2292 wrote to memory of 2580 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 31 PID 2292 wrote to memory of 2580 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 31 PID 2292 wrote to memory of 2580 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 31 PID 2292 wrote to memory of 2580 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 31 PID 2292 wrote to memory of 2580 2292 JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe"2⤵PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93593989c0bf9dd07f10428708ae5e0c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-