Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe
-
Size
591KB
-
MD5
81ecab9fa2aa18c3d5dc61e9b2bebb7b
-
SHA1
293ab6dd02f04a4b25d3f92a27385b49a042ab05
-
SHA256
ad1a7132112ed0a17f526989f2f50b61a43c71180de093582866b4541c24adc7
-
SHA512
8dc5e2a84de8c3fc4d8821c77143059e6513788d1eab51055df0a7a567aac995f3a6b01f1199380df1149b8aca04affd3680adb9696b6144ccb2ea4a5cd4b560
-
SSDEEP
12288:1aMPkBSBaeVAf4HgytutmnXZvmYEzLlXhf2LuK:gMPjBaMAAgytPMYEpX5uuK
Malware Config
Extracted
xloader
2.5
wogm
sub-dude.net
repeatcustom.com
goodspaz.com
sinagropuree.com
jyh8886.com
muescabynes.quest
stark.agency
nolimit168.com
hypermediastore.com
arab-xt-pro.com
gruppovimar.com
santamariamoto.express
affaridistribuciones.com
straetah.com
collectionsbyvivi.com
nalainteriores.com
weeklywars.com
insightmyhome.com
ucml.net
herderguru.com
sz-jialejia.com
xinglu56.com
tenselect.net
arepaspuesdc.com
cvkf.email
moseslakeapartment.com
chantaldesign.space
884651.com
yzyf88.com
seattlecanna.com
obsessive.company
blessedfurnitures.com
disparandose.com
smmakrygiannakis.online
buno8ce.com
javaportal.info
laoqu6666.com
portfolioinsidertips.com
workospbit.space
biocrafts.net
estebancantillo.com
appliancestar.xyz
gloriousbees.xyz
porchlightwoodworks.com
rawhoneytnpasumo2.xyz
pokipass-niigata.com
aodesai.store
powro.online
playin.one
minded-afoot.com
zpahura.com
bodybybetsy.com
camworker.cloud
mest2.com
chezlulu.paris
officeupdate365.com
jackdanska.com
glenndcp.com
huikanvip.com
connectedtoolstore.com
flogicpro.com
yourhomestimate.com
dogtraining5x5.com
truenettnpasumo2.xyz
eygtogel021.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3344-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exedescription pid process target process PID 4504 set thread context of 3344 4504 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exepid process 3344 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe 3344 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exedescription pid process target process PID 4504 wrote to memory of 3344 4504 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe PID 4504 wrote to memory of 3344 4504 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe PID 4504 wrote to memory of 3344 4504 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe PID 4504 wrote to memory of 3344 4504 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe PID 4504 wrote to memory of 3344 4504 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe PID 4504 wrote to memory of 3344 4504 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe 81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81ecab9fa2aa18c3d5dc61e9b2bebb7b_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3344