Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2025, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe
-
Size
429KB
-
MD5
ffc988ffa94c00b1df35c93df5656097
-
SHA1
0c5cc4c1393dfdb09d78cbf3cb6d2a639963e29a
-
SHA256
bec27130e133afdcfe5a436da5d210e96caadb8a922295caa36ac69a42d14fd9
-
SHA512
a89fb1e92a027b0fcf6e7660ac6ca11e6e14b2ad166eabd464d4895cf7d409c3798fc2737e63102213f297f42138bdc00635c8266ec133eaa5b9797a4490c1db
-
SSDEEP
12288:wUi2iN9liiu9k/5XNA57ALTCGz5Qx/TWaM:wUi1A45NA57yTCGz2x/Tw
Malware Config
Extracted
xloader
2.5
mjyv
wenyuexuan.com
tropicaldepression.info
healthylifefit.com
reemletenleafy.com
jmrrve.com
mabduh.com
esomvw.com
selfcaresereneneness.com
murdabudz.com
meinemail.online
brandqrcodes.com
live-in-pflege.com
nickrecovery.com
ziototoristorante.com
chatcure.com
corlora.com
localagentlab.com
yogo7.net
krveop.com
heianswer.xyz
idproslot.xyz
anielleharris.com
lebonaharchitects.com
chilestew.com
ventasdecasasylotes.xyz
welcome-sber.store
ahmedintisher.com
pastlinks.com
productprinting.online
babybox.media
volteraenergy.net
chinatowndeliver.com
behiscalm.com
totalselfconfidence.net
single-on-purpose.com
miyonbuilding.com
medicalmanagementinc.info
bellaalubo.com
dubaibiologicdentist.com
jspagnier-graveur.com
deskbk.com
thehauntdepot.com
5fbuy.com
calmingscience.com
luvnecklace.com
noun-bug.com
mysenarai.com
socialmediaplugin.com
livinglovinglincoln.com
vaxfreeschool.com
bjjinmei.com
p60p.com
upgradepklohb.xyz
georges-lego.com
lkkogltoyof4.xyz
fryhealty.com
peacetransformationpath.com
lightfootsteps.com
recreativemysteriousgift.com
luminoza.website
mccorklehometeam.com
car-insurance-rates-x2.info
serpasboutiquedecarnes.com
1971event.com
simpeltattofor.men
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral2/memory/4116-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4116-15-0x0000000001950000-0x0000000001C9A000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2976 set thread context of 4116 2976 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2976 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe 2976 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe 4116 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe 4116 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2976 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2976 wrote to memory of 4116 2976 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe 99 PID 2976 wrote to memory of 4116 2976 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe 99 PID 2976 wrote to memory of 4116 2976 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe 99 PID 2976 wrote to memory of 4116 2976 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe 99 PID 2976 wrote to memory of 4116 2976 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe 99 PID 2976 wrote to memory of 4116 2976 JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ffc988ffa94c00b1df35c93df5656097.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-