Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 13:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/gjspvjmvb.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/gjspvjmvb.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe
-
Size
376KB
-
MD5
a26c06af19d765ddcb32a48cd6acb1eb
-
SHA1
152dcab66baef093434bf69a0c3f9e78f7bbeb90
-
SHA256
35204f1850b1439ef9a8fd958d6c3045edae69378aa3593021795d0600fc5a01
-
SHA512
98945dbca44f5620c66efb7fc323e796e04040d0d19a1e5514843daa5c3ee6696739e9e19c6b38ff78ce3328db45d073cab471fabd591e4b962248b4d24422fb
-
SSDEEP
6144:qBlL/k6xymrfKeNn6/13qb6RVCz9j3wJPJFpSZX8F/wnq5onDZiD7ptk2:QhymjKetV+RWTiJvKnq5KDZiD7pX
Malware Config
Extracted
xloader
2.5
b65i
leofighters.com
smartat2.xyz
encontrevariedades.com
jimwilliamstutoring.com
kanpaiecuador.com
accura-inv.com
xtzgjxzz.com
scentstrategies.com
high-clicks2.com
hadishgebray.com
woodlawnbailbonds.com
dmsolutionsco.com
rdvulm21.com
beachyweens.com
ishirmansingh.com
rimmasbracelets.com
kellibrat.com
roselmasm.com
datkamoney.info
fermers.club
veytrex.com
bigfussblog.com
seehow3.com
howtosellhighticket.com
gv-china.com
midatlanticbaths.com
peoplexplants.com
xinhe138.com
peoplefirstflorida.com
lk-safe-keepingtoyof4.xyz
lavish-hika.com
thefooddrone.com
lowkeymastery.com
ferratahvar.com
ntgc.glass
ctfeldsine.com
131inwood.com
austinfishandchicken.com
adambridewell.com
starzara.com
pillfinancialliteracy.com
urlos.store
coralhide.com
y6pw.xyz
palazzoloan.com
peoplesadvantage.net
konzertmanagement.com
alphapat-sa.com
moresatisfy.club
sexynailcompany.com
janlgesnetwork.net
manifestingiam.com
vehicaldashino.com
jazminsalym.com
strtplay2day.info
insureagainstearthquake.com
sddn57.xyz
staygood.gmbh
paymentssecureweb.com
gee-law.com
tenloe098.xyz
mikevideodirection.online
povital.com
ktrtaiwan.com
onewebuy.net
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2284-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
pid Process 1708 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1708 set thread context of 2284 1708 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2284 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2284 1708 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe 31 PID 1708 wrote to memory of 2284 1708 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe 31 PID 1708 wrote to memory of 2284 1708 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe 31 PID 1708 wrote to memory of 2284 1708 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe 31 PID 1708 wrote to memory of 2284 1708 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe 31 PID 1708 wrote to memory of 2284 1708 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe 31 PID 1708 wrote to memory of 2284 1708 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5cb5ae97fd494cd241495179668d3a3d2
SHA133e6282a11c9140860710cd4a251e428e5cb75b8
SHA2562e31c7a695a70e216180fefa04ff81c8ad783b72b8d5fe40f506e00ada784f6f
SHA51283d265679fcb712cb8810d9b24a68c2d952cdb00656464b3c52a34a9bac48a62d2ed26d82ff0837946876bc1d992796376703a394da4c451cae671a043f32f44