Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
e697597160d3446c70406d8089ad9422_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e697597160d3446c70406d8089ad9422_JaffaCakes118.exe
-
Size
585KB
-
MD5
e697597160d3446c70406d8089ad9422
-
SHA1
0c3af2a2b19b935a24a1ef33cb0ed454f6225cbc
-
SHA256
f285919ddd1e956b6bcb0572ab1eeca5553617ee8e84f5afe564f63e3d8477cb
-
SHA512
9ad0d6a39001724998211951f9f8ab757fd0fd599bf55f3cba9f560e913fc64c7f0c299c7dc65284f833ad6211cdb6019c7dc5aa464e21e48bb703044e582a9c
-
SSDEEP
12288:ny3bU4N/HJRNwwC6dQ7HG+4FnjLlOhsxeHHb:0fJrPZQ7HGhBpOyxenb
Malware Config
Extracted
xloader
2.5
fqiq
driventow.com
ipatchwork.today
bolder.equipment
seal-brother.com
mountlaketerraceapartments.com
weeden.xyz
sanlifalan.com
athafood.com
isshinn1.com
creationslazzaroni.com
eclecticrenaissancewoman.com
satellitephonstore.com
cotchildcare.com
yamacorp.digital
ff4cuno43.xyz
quicksticks.community
govindfinance.com
farmersfirstseed.com
megacinema.club
tablescaperendezvous4two.com
ecarehomes.com
floaterslaser.com
benisano.com
saint444.com
thedusi.com
avafxtrade.online
hanenosuke.com
suntioil4u.com
healthyweekendtips.com
24000words.com
ofbchina.net
begukiu0.info
wolmoda.com
mask60.com
4bellemaison.com
mambacustomboats.com
sedsn.com
doggycc.com
kangrungao.com
pharmacistcharisma.com
passiverewardssystems.com
qywyfeo8.xyz
shenjiclass.com
rdoi.top
lavishbynovell.com
fleetton.com
hillcresthomegroup.com
hartfulcleaning.com
srofkansas.com
applebroog.industries
phillytrainers.com
dmc--llc.com
sosoon.store
daysyou.com
controldatasa.com
markarge.com
hirayaawards.com
clinicscluster.com
sophiagunterman.art
kirtansangeet.com
residential.insure
ribbonofficial.com
qianhaijcc.com
fytvankin.quest
esyscoloradosprings.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3760-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2908 set thread context of 3760 2908 e697597160d3446c70406d8089ad9422_JaffaCakes118.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3760 e697597160d3446c70406d8089ad9422_JaffaCakes118.exe 3760 e697597160d3446c70406d8089ad9422_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3760 2908 e697597160d3446c70406d8089ad9422_JaffaCakes118.exe 93 PID 2908 wrote to memory of 3760 2908 e697597160d3446c70406d8089ad9422_JaffaCakes118.exe 93 PID 2908 wrote to memory of 3760 2908 e697597160d3446c70406d8089ad9422_JaffaCakes118.exe 93 PID 2908 wrote to memory of 3760 2908 e697597160d3446c70406d8089ad9422_JaffaCakes118.exe 93 PID 2908 wrote to memory of 3760 2908 e697597160d3446c70406d8089ad9422_JaffaCakes118.exe 93 PID 2908 wrote to memory of 3760 2908 e697597160d3446c70406d8089ad9422_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e697597160d3446c70406d8089ad9422_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e697597160d3446c70406d8089ad9422_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\e697597160d3446c70406d8089ad9422_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e697597160d3446c70406d8089ad9422_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-