Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 15:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/skjesair.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/skjesair.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe
-
Size
254KB
-
MD5
cc19c69f756ab25010c68a64b03f2eee
-
SHA1
48e28f2fcb7a13efa879b99b14ba52571b6e5224
-
SHA256
ac4a0328d512526f20122f0399d557b1334f3b2ac264d9e749d6d2788e956b2e
-
SHA512
6a0caa9934e2c4366e312be5b6ce60e0d3ffb715ee6d97eaf13dc4cd485d305e2972868624e4460b5076ff0eec1a94ba20199f2502ab290a584b0705ff12d762
-
SSDEEP
6144:wBlL/crEZe0DNzwg7f7qKvWghBaJ4JCe/IVtg7MxY0bJv0T:CerEZbDug7zqitwI/Ug7VsE
Malware Config
Extracted
xloader
2.5
epz2
moslemco.com
besrbee.com
in-teh.com
fofomej.xyz
partner2form.com
codigocentro.com
thgn29.xyz
behindwp.com
oliviatevents.com
jammineugene.com
colobohieran.quest
freidenfelt.com
ribbitathleticwear.com
dreamlylife.com
hotelcxn.com
preciosaglass.com
lawaves.net
thatsnotmydriveway.com
northportbusinesscenter.com
dayinamman.com
bootsinspectors.com
bluestarryshimmeringsky.com
sprinklekart.com
natiymati.com
basculasperu.com
nurixpharmaceutical.com
themorningprayer.com
clashofkingsgame.net
javkangaroo.com
best10canadianreviews.info
025xy.xyz
businessexpansion2021.com
hitxxxmovies.com
wf-lc.com
imsrisk.com
spreadsheetcrashcourse.com
richardklewis.store
packgames.store
xiluoxtmcwj.com
gvcxyk.com
versebay.com
stopswatting.com
buranipsicologia.com
tgg-customs.com
indevmobility.mobi
buygaia.com
sweetharmony.info
theassistant46.com
espinoza.tech
reginejohansen.com
tecni-freezer.com
clarkallurerepublic.com
robbiesbqs.com
seatachome.com
odbialegostoku.xyz
jvmyl.ink
ethereumwarrior.com
minadermall.com
analoginsight.com
soyinversionista.lat
sumiyoshiku-herunia.xyz
astrovivan.com
sanucaps.com
midam-api.com
pofungrealty.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2308-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
pid Process 2084 JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2084 set thread context of 2308 2084 JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2308 JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2308 2084 JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe 30 PID 2084 wrote to memory of 2308 2084 JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe 30 PID 2084 wrote to memory of 2308 2084 JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe 30 PID 2084 wrote to memory of 2308 2084 JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe 30 PID 2084 wrote to memory of 2308 2084 JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe 30 PID 2084 wrote to memory of 2308 2084 JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe 30 PID 2084 wrote to memory of 2308 2084 JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5f9099ad46c16a20b52f173f5806426bf
SHA1b7543e7af6930e16520f41bc0c3e5fdd5f1ce45d
SHA256e80f972bce5004dfe27ca8a8063f354be8b0b618119db1e706242d28217e02ca
SHA5126d6c2aec061cdc3e34b7774e1a16971f246b79da659bc8140d0965130a54bf81f57ad50d56314b5b5f551eb1d24e15d2d6131e041665dc3ecb921af3a426cdc1