Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/bckkx.dll
Resource
win7-20240319-en
General
-
Target
1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe
-
Size
252KB
-
MD5
1dbf7e4b0bfbfbaa955a52f01d5ec385
-
SHA1
dbd591beec7641072c443cc39b6efd14d87508c8
-
SHA256
247ddda6e2702472217bec887b6e53bbf355e63d45753b4227956ea3e5a0272e
-
SHA512
4cf1dd447c467d664a5ccc0be8bd84e65c6101534c0c3b09ba8113eb3181b2e32de27d58a252510526c2d5501cdf131e9a8f5624d3125fdf76a1be1e8c9c76d8
-
SSDEEP
6144:wBlL/cLe5iaEXSSPpWOvxspbRrE+vmQV85qgNPyYE:CeVXSrOvWrEj2B
Malware Config
Extracted
xloader
2.5
dgt9
glimpse-media.com
crimsongomidv.xyz
seo-clicks6.com
cloudbreakhq.com
oakabbey.net
findcasinoslots.com
thehelloloveshop.com
havetsuczyli.quest
celestialtransportation.net
nianlun.wiki
valentinaturals.com
808gang.net
tykaa.com
sparoom.store
empregosbr1.online
visaractivateddprocessing.com
industriamadereraargentina.com
ekopressbrake.com
984561.com
oklahomacasinoreviews.com
weihao.online
ct5k.com
ncya14.xyz
drinkrhino.com
syrianwindow.com
dsj2015.com
income-icm.com
rdaubuisson.com
686281.com
crushanxiety.com
tetstore.com
api-23nnys.com
jizhibao.xyz
echosymbol.com
gftsets.com
tenlog066.xyz
syzhangyi.com
fortlewisapartment.com
flatironstreeservice.com
daomars.com
metaverse360.biz
suplena.top
rontestcfb29.com
christmaspyjamashop.com
lftreasures.com
datsdopedesign.com
recloud-inc.com
maloma4u.com
imagesetblues.paris
wantto.net
barco-group.com
ebonygirls.net
freenewgameonline.com
berryfreshcans.com
ez.money
maxicashprofgt.xyz
wilyardmarketing.com
sukien-membership-garana.com
andrewwoodrealty.com
efllubricants.com
wwwa526.com
khl0q.com
beijixing-zs.com
suwei8.com
discountaquarium.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/1608-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
pid Process 2864 1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2864 set thread context of 1608 2864 1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1608 1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2864 wrote to memory of 1608 2864 1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe 28 PID 2864 wrote to memory of 1608 2864 1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe 28 PID 2864 wrote to memory of 1608 2864 1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe 28 PID 2864 wrote to memory of 1608 2864 1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe 28 PID 2864 wrote to memory of 1608 2864 1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe 28 PID 2864 wrote to memory of 1608 2864 1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe 28 PID 2864 wrote to memory of 1608 2864 1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1dbf7e4b0bfbfbaa955a52f01d5ec385_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5eaddca0182a37dcadc481a26307ad111
SHA1a7aef3dcbd7fffedc716dc70610a1f0f62fcaf42
SHA256a62639b271e480d9aa28d50945051ae35577711d95702f270060d809b062bb56
SHA5129409069ca080c0170a70ec7e5baf7dd4c959362c9f540d525f45644ed95012f87b6818b16085bff2e1ae843281be97183372b8b0721673720bb76e93a5704c3d