Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 22:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe
-
Size
585KB
-
MD5
d40d16f11bd6a0f337f9e5ea381cc9da
-
SHA1
abcce81167138b25b794617bc0998db3337ecd6e
-
SHA256
abf5690018f60f621f9bd9e5e342d310825e3b3ad2d8ddfb0c5b1b0de95ee846
-
SHA512
c727da32eeca51397249b798c5faf3537af508f945a125624b082edbbed07ca26b405943c91728d0a738e51d89c3324c2b152be660b7da63c2a746bfa2799157
-
SSDEEP
12288:y4n3bUzN/aLflq8FJwY1z6eRuQtbbtLlOhsxeHHk:N6CRSY1X99ppOyxenk
Malware Config
Extracted
xloader
2.5
fqiq
driventow.com
ipatchwork.today
bolder.equipment
seal-brother.com
mountlaketerraceapartments.com
weeden.xyz
sanlifalan.com
athafood.com
isshinn1.com
creationslazzaroni.com
eclecticrenaissancewoman.com
satellitephonstore.com
cotchildcare.com
yamacorp.digital
ff4cuno43.xyz
quicksticks.community
govindfinance.com
farmersfirstseed.com
megacinema.club
tablescaperendezvous4two.com
ecarehomes.com
floaterslaser.com
benisano.com
saint444.com
thedusi.com
avafxtrade.online
hanenosuke.com
suntioil4u.com
healthyweekendtips.com
24000words.com
ofbchina.net
begukiu0.info
wolmoda.com
mask60.com
4bellemaison.com
mambacustomboats.com
sedsn.com
doggycc.com
kangrungao.com
pharmacistcharisma.com
passiverewardssystems.com
qywyfeo8.xyz
shenjiclass.com
rdoi.top
lavishbynovell.com
fleetton.com
hillcresthomegroup.com
hartfulcleaning.com
srofkansas.com
applebroog.industries
phillytrainers.com
dmc--llc.com
sosoon.store
daysyou.com
controldatasa.com
markarge.com
hirayaawards.com
clinicscluster.com
sophiagunterman.art
kirtansangeet.com
residential.insure
ribbonofficial.com
qianhaijcc.com
fytvankin.quest
esyscoloradosprings.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2380-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2580 set thread context of 2380 2580 JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2380 JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2380 2580 JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe 31 PID 2580 wrote to memory of 2380 2580 JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe 31 PID 2580 wrote to memory of 2380 2580 JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe 31 PID 2580 wrote to memory of 2380 2580 JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe 31 PID 2580 wrote to memory of 2380 2580 JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe 31 PID 2580 wrote to memory of 2380 2580 JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe 31 PID 2580 wrote to memory of 2380 2580 JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d40d16f11bd6a0f337f9e5ea381cc9da.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-