Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe
-
Size
463KB
-
MD5
6429aa83e4bc083b4f0b3f44b0d7950f
-
SHA1
0ead59881f054284f611accb61451ed1ffc818fc
-
SHA256
96c57ae661562e958e01bb0b490c09a0a51bb367931620223174963de88bdfcb
-
SHA512
186383701c591db2c011c8ae24920759c10880068dd217e32110ae54b9c7f0863b7fb04e893f601a234742deb5838a22820dc8835ba9198d66b7bb297d502f9b
-
SSDEEP
6144:zMkhBsNolyfnZle9UX08PF85KQ4O1LkyUCZ2e12XZ0bp2Qo7lYB:oSBblyfnZlW+08+5KQpyy52nZ0vo7a
Malware Config
Extracted
xloader
2.5
ef6c
gicaredocs.com
govusergroup.com
conversationspit.com
brondairy.com
rjtherealest.com
xn--9m1bq8wgkag3rjvb.com
mylori.net
softandcute.store
ahljsm.com
shacksolid.com
weekendmusecollection.com
gaminghallarna.net
pgonline111.online
44mpt.xyz
ambrandt.com
eddytattoo.com
blendeqes.com
upinmyfeels.com
lacucinadesign.com
docomoau.xyz
xn--90armbk7e.online
xzq585858.net
kidzgovroom.com
lhznqyl.press
publicationsplace.com
jakante.com
csspadding.com
test-testjisdnsec.store
lafabriqueabeilleassurances.com
clf010.com
buybabysnuggle.com
uzmdrmustafaalperaykanat.com
levanttradegroup.com
arcflorals.com
kinglot2499.com
freekagyans.com
region10group.gmbh
yeyelm744.com
thehomedesigncentre.com
vngc.xyz
szesdkj.com
charlottewright.online
planetgreennetwork.com
pacifica7.com
analogueadapt.com
sensorypantry.com
narbaal.com
restaurant-utopia.xyz
golnay.com
szyyglass.com
redelirevearyseuiop.xyz
goldsteelconstruction.com
discovercotswoldcottages.com
geniuseven.net
apricitee.com
stopmoshenik.online
ya2gh.com
instatechnovelz.com
dbe648.com
seifjuban.com
conquershirts.store
totalcovidtravel.com
pamperotrabajo.com
satellitphonestore.com
fis.photos
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3508-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exedescription pid process target process PID 4972 set thread context of 3508 4972 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exepid process 3508 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe 3508 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exedescription pid process target process PID 4972 wrote to memory of 3508 4972 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe PID 4972 wrote to memory of 3508 4972 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe PID 4972 wrote to memory of 3508 4972 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe PID 4972 wrote to memory of 3508 4972 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe PID 4972 wrote to memory of 3508 4972 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe PID 4972 wrote to memory of 3508 4972 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe 6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6429aa83e4bc083b4f0b3f44b0d7950f_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508