Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 06:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe
-
Size
400KB
-
MD5
dd201b746a8078d6a590c24015ccd1a8
-
SHA1
d317c771f4dc6e0c458a7e37b282067d061e4d75
-
SHA256
35343871869b50c2cba5ac827b1a7201c5adcb1dfb6cd3098d4f245ba49ceb58
-
SHA512
bb49f42aaacc4414d32423b316becf274a4dc2010932ea42ec919ce7da32b839ed890de6bf8501494a391fe0043c86ebff21b7035b92eafcd72784656cf075d2
-
SSDEEP
6144:SjyESJejXMRMCTc/8Yo0g333ZFFAdCJ5sQK260aBTY:SjyESJcMR1QUYzg3nlAu5s2la+
Malware Config
Extracted
xloader
2.5
mqi9
spectehnika-rb.com
daleproaudio.xyz
cpw887.com
gosbs-b01.com
clarkmanagementhawaii.com
taobaoi68.xyz
hoppedchardonnay.com
extremesavings.net
newbiepanda.com
arul-jegadish.com
kellibrat.com
avto-mercury.info
percussionportal.com
colorfulworldpublishing.com
notvaccinatedjobs.com
cattavida.com
pioniersa.com
yanduy.com
mzjing.com
piedmontpines.school
sosibibyslot.space
yfly635.xyz
undauntedearth.com
ratqueen.art
docomoat.xyz
themysticalmushroom.com
woodbinecommunityplan.com
al-m3hd.com
globalglodpower.com
circuitboardsolution.com
zoipartner.com
varibat45.com
sean-inspires.com
533hd.com
yuezhong66.com
latewood.xyz
mrsparberrysplace.com
shyy-life.com
znypay.com
eludice.net
kalitelihavaperdesi.com
classicmusclecargarage.com
divulgesloatr.xyz
djkozmos.com
eazyjspowerwash.com
xn--naturecan-823hqc4t8089b.xyz
merchediazcobo.com
09mpt.xyz
zapoartist.quest
vagusartesaniaymoda.online
blogbynasir.com
cliffwoof.com
aj03yansinbiz.biz
gaboshoes.com
italiangomvqs.xyz
safari-fadel.com
diorbijoux.com
lookforwardswiss.com
qsygqc.com
wehaveunconditionallove.com
kingsmeadfarm.com
928711.com
saint444.com
fashiona.space
vulcanopresale.icu
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/900-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3096 set thread context of 900 3096 JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 900 JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe 900 JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3096 wrote to memory of 900 3096 JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe 96 PID 3096 wrote to memory of 900 3096 JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe 96 PID 3096 wrote to memory of 900 3096 JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe 96 PID 3096 wrote to memory of 900 3096 JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe 96 PID 3096 wrote to memory of 900 3096 JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe 96 PID 3096 wrote to memory of 900 3096 JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dd201b746a8078d6a590c24015ccd1a8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:900
-