Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2024 17:53
Static task
static1
Behavioral task
behavioral1
Sample
a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe
-
Size
351KB
-
MD5
a2a3dde9afc863ab8254f6a4dbd63eb7
-
SHA1
1bd5ac9ca23d589175066935b1e0f9afc2ea14d3
-
SHA256
c6bd41deb507046a69d680f7ce7c06ec255fc0ca19223d57788bca61cc14beb9
-
SHA512
8039b186138cf1ddac5571f1f676e57e8cab828f95d8dfc24364473624f76c39e27708410b2cf2ba3f2e360428a22c43f4b776eeb72b7dac2c442a01b63de125
-
SSDEEP
6144:5ei2R2IMkhBLcZzDmAtte2gxLOTyJsqsffCpUm4v/HqoCXFwfViduVpPu:JjSBw9he20idqsffr1vvqowGiduVpW
Malware Config
Extracted
xloader
2.5
bs8f
vasilnikov.com
parkate.club
pol360.com
handmadequatang.com
consult-set.com
nourkoki.com
theveganfusspot.com
dreamssail.com
pinpinyouqian.xyz
satellitphonestore.com
yotosunny.com
telosaolympics.com
gogetemm.com
yozotnpasumo2.xyz
avantgardemarket.com
glenndcp.com
dirtydriverz.com
avaui.com
anchoredtheblog.com
marianaoliveiraarquitetura.com
dadaman.com
hackensackvet.com
onelovecafeatl.com
top-recordtodiscovertoday.info
goodzza.net
gideonajibike.com
2010.pro
room1029.com
tucochepordinero.net
natsuyagimaki.com
daleproaudio.xyz
cryptoregulations.xyz
vmini.info
bukketfantom.quest
sgpvbzw.com
straightii.com
exploitgomyau.xyz
cvwerg.com
sikiich.com
anchoramolnile.com
eljkj.com
leroyalstevenson.com
narae-digital.com
swalayan.digital
market1c.store
vitaminecrew.com
sirabeyo.net
bornholm-urlaub.info
michael-ludwig.info
innoattic.com
cupandthoughts.com
ppd-mall.com
sponsoredcrew.com
cardiopulmonaryservices.com
ff4ciib4q.xyz
xn--kzlarndkkan-zhb69deah.com
saint444.com
serc0-na.com
idecor.asia
zombiesoflalaland.com
medinaes.xyz
deluxhaus.com
alwaysmode.com
lastpassword.net
rwilogisticsandbrokerage.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3668-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exedescription pid process target process PID 1724 set thread context of 3668 1724 a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exepid process 3668 a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe 3668 a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exedescription pid process target process PID 1724 wrote to memory of 3668 1724 a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe PID 1724 wrote to memory of 3668 1724 a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe PID 1724 wrote to memory of 3668 1724 a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe PID 1724 wrote to memory of 3668 1724 a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe PID 1724 wrote to memory of 3668 1724 a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe PID 1724 wrote to memory of 3668 1724 a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2a3dde9afc863ab8254f6a4dbd63eb7_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668