Analysis
-
max time kernel
73s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 23:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe
-
Size
461KB
-
MD5
f12bf73a1cb81b5ddd8dd6ed66e610f1
-
SHA1
cb8b0497c95512bf9233823f7d20937424c87207
-
SHA256
6446736e3662120e1fe4c3518bc8e6d14553f6b0b27aaf1fc5676e1f73a50c33
-
SHA512
385c4de5deca014f7486f802efc9a305e2bd2c457a21b63f66bf6f3caef1acee6537f32c7cd4690ee0378939dfad4444abb832c31fb5b5cfcb5bf7ae86715bad
-
SSDEEP
6144:UfHlm0I6Uqd2GhNoWnti/tanHwGslCmeMPSeKsyLGjloc5GWBqeq8Q2:UfFZUi2iN9NH3wR6Ajld5G0qf8
Malware Config
Extracted
xloader
2.5
euzn
235296tyc.com
gold12guide.art
baibuaherb.com
weberwines.tax
chezvitoria.com
aidenb.tech
pitchdeckservice.com
surgeryforfdf.xyz
workunvaccinated.com
hrtaro.com
yourotcs.com
sonimultispecialityclinic.com
consultantadvisors.com
pentesting-consulting.com
dantechs.digital
longshifa.online
taweilai.net
imyusuke.com
cashndashfinancial.com
fasiglimt.quest
jakital.com
graywolfdesign.com
pepeavatar.com
predixlogisticscourier.com
football-transfer-news.pro
herbalmedication.xyz
esd66.com
janesgalant.quest
abcrefreshments.com
chaoxy.com
rediscoveringyouhealing.com
mcrjadr5.xyz
n4sins.com
faithful-presence.com
013yu.xyz
isystemslanka.com
newbeautydk.com
ethiopia-info.com
hgaffiliates.net
anodynemedicalmassage.com
esohgroup.com
clinicamonicabarros.com
rafathecook.com
londonescort.xyz
dreamites.com
webtiyan.com
cnnautorepair.com
soposhshop.com
aarohaninsight2021.com
arceprojects.com
mecasso.store
mirai-energy.com
barwg.com
angeescollections-shop.com
xinlishiqiaoqiao.xyz
linuxsauce.net
dirbn.com
anandiaper.xyz
blackpanther.online
livinwoodbridgefarms.com
diepraxiskommunikation.com
radiosaptshahid.com
gofieldtest.com
minxtales.com
heser.net
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2924-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 2924 2116 JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2924 JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2924 2116 JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe 30 PID 2116 wrote to memory of 2924 2116 JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe 30 PID 2116 wrote to memory of 2924 2116 JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe 30 PID 2116 wrote to memory of 2924 2116 JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe 30 PID 2116 wrote to memory of 2924 2116 JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe 30 PID 2116 wrote to memory of 2924 2116 JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe 30 PID 2116 wrote to memory of 2924 2116 JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f12bf73a1cb81b5ddd8dd6ed66e610f1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-