Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 10:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe
-
Size
685KB
-
MD5
e2827700e9676ad0d4b734d5f4a221b3
-
SHA1
2997b29050c7e44072f886705cbd4be6a3edda97
-
SHA256
a8ea6b5e7721a2d508d362f9e75fc38fe3b845375c358829ef0604cc2345aa13
-
SHA512
d16e61c88eb9c32fd1c74b4893fb08092bbca5ae17f4275eecd7bc2352dad0904e4dc603be4747e0a9460507187e2bad78a51ffc055cb9b2b7baebff550abbd2
-
SSDEEP
12288:FRZHIUoN4rfIpj+fvRwIyizYi98wUpAeeqRVTHOi5xNZEraoosn:F3oUoNe8Knnyij98wieqnt
Malware Config
Extracted
xloader
2.5
k8u7
ly3389.com
biggergrip.com
guitarbadon.net
zbjiachuang.com
maaratechnology.com
perdiemsuites.com
israel-grahamcoates.com
blackbirdfarmette.com
klhobbies.com
locdinzone.com
bestinvest-4-you.com
howtofindbantingbalance.com
kairoslabs.online
hteaz.com
banjjakdesign.com
reworkgear.com
oklahomaexcavation.com
tenloe051.xyz
blockchainpress.info
panchotrucking.com
prosperwithrose.com
tutuum.com
growingainzfitness.net
bra866.com
feignco.com
suzannesbooks.com
druid-club.store
begomago.com
tuerkscout.com
htlyoga.com
meloba.com
sosomoon.com
trendingintown.com
guidedwaveradar.com
doesaffiliatemarketing.xyz
nibykoo5.xyz
lv.company
theascententerprises.com
mywallofnfts.com
harpo-solutions.com
oliverchilde.top
gharkraft.com
promo-airdrop.com
dualipaminneapolis.com
gsjbd25.club
usmartdm.com
lebonespoir.com
3ebpa4asef.com
signalist.xyz
868h.asia
dryjancan.com
thevwcblog.com
mckinneysfinest.com
trustedpresident.com
sugarmamascandybars.com
alfilermarketing.com
classicshoes.club
the-vintage-image-shop.xyz
fyvisuals.com
etc-meisai1.tech
ecopolymer.group
movingtolincolnca.com
mbdesign-wordpress.com
hpywk.com
ardisadr.online
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4228-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4348 set thread context of 4228 4348 JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4228 JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe 4228 JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4348 wrote to memory of 4228 4348 JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe 91 PID 4348 wrote to memory of 4228 4348 JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe 91 PID 4348 wrote to memory of 4228 4348 JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe 91 PID 4348 wrote to memory of 4228 4348 JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe 91 PID 4348 wrote to memory of 4228 4348 JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe 91 PID 4348 wrote to memory of 4228 4348 JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2827700e9676ad0d4b734d5f4a221b3.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-