Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-03-2024 04:26
Static task
static1
Behavioral task
behavioral1
Sample
4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe
-
Size
585KB
-
MD5
4d10925c2d52223135b1a2e069bc5ab0
-
SHA1
1eb2a075efe3f17fecfdd9d4cc5d39266e5cd162
-
SHA256
832c65a202ec1c69a8297af3d2fc3d233ac65b7c2c670f30d0694089601c9cfe
-
SHA512
7708579ba479c687705cec9ed5eb9d0ef30339c8cb50d18677d00f05fb37f403fbf56d8101ba9dd93a8216d1ee316e07ae4bb2667feab0ee889e06bff810164a
-
SSDEEP
12288:j+3bUfN/EH056Nvdg0nRrR9rWWy+vdLlOhsxeHH:HC0YtqGvWVapOyxen
Malware Config
Extracted
xloader
2.5
fqiq
driventow.com
ipatchwork.today
bolder.equipment
seal-brother.com
mountlaketerraceapartments.com
weeden.xyz
sanlifalan.com
athafood.com
isshinn1.com
creationslazzaroni.com
eclecticrenaissancewoman.com
satellitephonstore.com
cotchildcare.com
yamacorp.digital
ff4cuno43.xyz
quicksticks.community
govindfinance.com
farmersfirstseed.com
megacinema.club
tablescaperendezvous4two.com
ecarehomes.com
floaterslaser.com
benisano.com
saint444.com
thedusi.com
avafxtrade.online
hanenosuke.com
suntioil4u.com
healthyweekendtips.com
24000words.com
ofbchina.net
begukiu0.info
wolmoda.com
mask60.com
4bellemaison.com
mambacustomboats.com
sedsn.com
doggycc.com
kangrungao.com
pharmacistcharisma.com
passiverewardssystems.com
qywyfeo8.xyz
shenjiclass.com
rdoi.top
lavishbynovell.com
fleetton.com
hillcresthomegroup.com
hartfulcleaning.com
srofkansas.com
applebroog.industries
phillytrainers.com
dmc--llc.com
sosoon.store
daysyou.com
controldatasa.com
markarge.com
hirayaawards.com
clinicscluster.com
sophiagunterman.art
kirtansangeet.com
residential.insure
ribbonofficial.com
qianhaijcc.com
fytvankin.quest
esyscoloradosprings.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2548-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exedescription pid process target process PID 772 set thread context of 2548 772 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exepid process 2548 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exedescription pid process target process PID 772 wrote to memory of 2548 772 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe PID 772 wrote to memory of 2548 772 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe PID 772 wrote to memory of 2548 772 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe PID 772 wrote to memory of 2548 772 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe PID 772 wrote to memory of 2548 772 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe PID 772 wrote to memory of 2548 772 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe PID 772 wrote to memory of 2548 772 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe 4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4d10925c2d52223135b1a2e069bc5ab0_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/772-6-0x0000000004C70000-0x0000000004CC2000-memory.dmpFilesize
328KB
-
memory/772-0-0x00000000013E0000-0x0000000001478000-memory.dmpFilesize
608KB
-
memory/772-2-0x0000000004CC0000-0x0000000004D00000-memory.dmpFilesize
256KB
-
memory/772-3-0x0000000000A20000-0x0000000000A3C000-memory.dmpFilesize
112KB
-
memory/772-4-0x0000000074E30000-0x000000007551E000-memory.dmpFilesize
6.9MB
-
memory/772-5-0x0000000004CC0000-0x0000000004D00000-memory.dmpFilesize
256KB
-
memory/772-1-0x0000000074E30000-0x000000007551E000-memory.dmpFilesize
6.9MB
-
memory/772-14-0x0000000074E30000-0x000000007551E000-memory.dmpFilesize
6.9MB
-
memory/2548-13-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2548-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2548-9-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2548-7-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2548-15-0x0000000000850000-0x0000000000B53000-memory.dmpFilesize
3.0MB
-
memory/2548-16-0x0000000000850000-0x0000000000B53000-memory.dmpFilesize
3.0MB