Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 06:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe
-
Size
673KB
-
MD5
f9ed39427014d807dbbbf35c45d411bd
-
SHA1
ec55a74f3cda76f09db8f409572a944c8bdaf346
-
SHA256
309823f6a6820db5d24443327e3b566f8d2aa16b3a9052086f521488a46e1532
-
SHA512
c5598c7f370c4c9c87c6a4e2782add3ef609abdec4cc5325ca0e27e7a7a75a23dcf8d1496b861449e1b3c205c3f63958795a33e8ae070894d100d34bc6d96ec7
-
SSDEEP
12288:jodfjOW9PQ/UaYd0uw7yk8eZ7Lz2p9g9YuzA+jJp0LdMJUl22:8Bu/kO7nP97z9
Malware Config
Extracted
xloader
2.5
pfrp
aodesai.store
sultrymilfs.com
gratisratio.com
syntheticloot.net
imnntomen.xyz
fantacyfreshwaterfishing.com
onesolutionasia.com
xn--laufgefhl-bocholt-82b.com
hausense.quest
broncomall.com
ioewur.xyz
wilsontennis.store
eleditorplatense.com
windowcompanynaperville.com
azuremodule.com
letziexpress.com
idtbc.com
herbalshishaflower.com
basementdwellersnft.com
28686ay.com
laloohome.com
xn--22c2bxc0b4e1al.com
riverlegacyelectric.com
tophil.net
2tina.com
intrinsicslash.com
molrik.space
groundedexplorer.com
dalong56.com
prestigemarbleimports.com
qeeab.com
asnntio.xyz
darkxfreegiveway.com
mgmdd.com
drtht.com
controle-fiscal.com
noblenimble.com
besasin09.com
ufitbeauty.com
holzmobil.eco
texasdominionrealty.com
monamodda.com
harmofranchising.com
tinyspout.com
hallohesselmann.com
monicaconary2086.com
ruiz-group.com
jamaludinsaputraaa.com
supportlgcopyright.com
you-smile.com
tallyapp.info
lalunagrife.store
cosareaction.com
trufflestance.com
prayershawls.store
uperionorthamerica.com
cqxbsdc.com
gothamstoneworks.com
thinkdelivery.net
grotevazen.com
sonaliandshazad.com
imnvr.com
digitaltradezone.com
api-findmy.xyz
25922727.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2908-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2172 set thread context of 2908 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 2908 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2916 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 31 PID 2172 wrote to memory of 2916 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 31 PID 2172 wrote to memory of 2916 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 31 PID 2172 wrote to memory of 2916 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 31 PID 2172 wrote to memory of 2908 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 32 PID 2172 wrote to memory of 2908 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 32 PID 2172 wrote to memory of 2908 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 32 PID 2172 wrote to memory of 2908 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 32 PID 2172 wrote to memory of 2908 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 32 PID 2172 wrote to memory of 2908 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 32 PID 2172 wrote to memory of 2908 2172 JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SKoCxTSW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5052.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9ed39427014d807dbbbf35c45d411bd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908
-