Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-04-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ygkzme.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ygkzme.dll
Resource
win10v2004-20240226-en
General
-
Target
7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe
-
Size
252KB
-
MD5
7ca5a6d622c55365fda10c9e9ba8ee88
-
SHA1
e79376618b25f054dc7cfd73d9561b05a5f6e64e
-
SHA256
89dd90006d6cd58559565a7ccebc2147780e2a3ae084b5d114b2077c2ae341d7
-
SHA512
9be8d1c85f536bb57e06b70e1af12754817e223a1345c8db0ecee08040d94695f0a1530397e08708ebde14d0621038743e003b784c63cc9b50d6ce3487f35625
-
SSDEEP
6144:wBlL/cR7xZGzMLX/dtAEF/fsZj18crt63UVB2eu6wLu7YPCGY6Q/:CeR7gMLAM/y18wtagAeuzLp1g
Malware Config
Extracted
xloader
2.5
hr8n
xn--z4qv1cr56dk0k.group
trend-shopping.net
redherring.agency
jeetopesekashback.xyz
myverizonbillpay.com
enjoy-developpement.com
reals-markets-34.xyz
nobadfeelings.com
libbybruce.space
noobcakes.com
silviomicalikush.xyz
taschenhimmel.guru
terradr.one
suvsangebotguenstigdeorg.com
bercatv.com
toytraderinc.com
mintnft.energy
apnagas.com
canalsidespeech.com
oporbagehi.quest
frutza.com
acmcnetwork.com
maoqiufushi.com
supere-mart.net
baumer-instruments.com
swiftremotestudio.com
mudatstudio.com
taobao789.xyz
threensales.com
balancedprivatepractice.com
chatelab.network
goddesslifecbd.com
matchmakerfiji.com
everokqroup.com
wolfgapwines.com
sairafashions.xyz
integrityinlending.com
tigerpay-partners.com
petanimals2021.com
paradojascomunicacion.com
saamcoheir.quest
ctgroweasy.com
drfgr1.com
andrusagency.com
uperionorthamerica.com
tkfaha.com
sadeghzeyni.com
preadmirer.info
casaoscarballas.com
kreworiginal.com
lipeengineering.com
metroprocesservers.com
secure01bchslogin.com
blackbait6.com
srivijayalakshmitravels.com
temperaninails.com
spotbrush.com
docsbuilda.com
thirdize.com
michaelkors-handbags.biz
189168app.com
bossylifestyle.online
topomappro.com
cursosphysioedu.online
pochi-owarai.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2088-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exepid process 1956 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exedescription pid process target process PID 1956 set thread context of 2088 1956 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exepid process 2088 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exedescription pid process target process PID 1956 wrote to memory of 2088 1956 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe PID 1956 wrote to memory of 2088 1956 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe PID 1956 wrote to memory of 2088 1956 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe PID 1956 wrote to memory of 2088 1956 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe PID 1956 wrote to memory of 2088 1956 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe PID 1956 wrote to memory of 2088 1956 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe PID 1956 wrote to memory of 2088 1956 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe 7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD582ef6b004a2d1441297053109ffde16c
SHA11780e9780c38e5be83008d42da2da782b5f27402
SHA2565e4bf71710738a4f7f90457c76546979b65716b42125f2fe81153ed9fe2b96e1
SHA512d1d7b3a038429cd0b27fbd5eb1633f6131ef68ae66f9d7dd272ca16498567b7b5e22138c5b1a91e563a617463949f3d5ab7cb7cce5a63cd1bca20f3dc5730ae2