Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 11:08
Static task
static1
Behavioral task
behavioral1
Sample
e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe
-
Size
949KB
-
MD5
e752ae0abe724829b72a2df162596e66
-
SHA1
123a9f1b3ef781f53833216bba2f93db069d017f
-
SHA256
9744a8f624cc86bce830db5caf4a5a8b2263b51f53ca384908b2557e5f9ce99d
-
SHA512
194ebe2332cc2aa6a177353b19d49749743a94a7145f1b83212b500f490a10cb060700a3fcbd545090c0e4401efd2a0fc23990d6291825880433d5271e415a17
-
SSDEEP
12288:y/WDc9F3nC0Py3gAhqEJbjJEKuR/pKhAgjqzkI9ymd4txhJrqU3Glk5u1EBbCaj:Q7+hX2zywkxhJrRcOuuC
Malware Config
Extracted
xloader
2.3
ssee
portalcanaa.com
korzino.com
dlylms.net
smartearphoneshop.com
olimiloshop.com
auvdigitalstack.com
ydxc.chat
yhk868.com
lifeinthedport.com
self-sciencelabs.com
scandicpack.com
hold-sometimes.xyz
beiputei.com
yourrealtorcoach.com
rxods.com
fundsoption.com
ahlstromclothes.com
ksdieselparts.com
accountmangerford.com
kuwaitlogistic.com
xuanthanhpham.com
uybike.com
babyacademycy.com
zhongbuwujin.com
reclaimminnesota.net
yurunhuatian.com
eigowith.com
pharmviewfarms.com
mcmillan-phillips.com
xinkseo.com
dabaichuihl.com
modifiedmkt.com
magnificocreative.com
energytrainingireland.com
special-beauty.net
solutionexperts.xyz
upstaff.info
taravelis.online
lushthingz.com
harwestco.com
126034cp.com
lamdep-gluwhitevn.website
megenep.com
upperreceiver.com
healthywayservices.com
groupebpcenatixis.com
blackledorganizations.net
carolinasoares.com
bureaultd.com
smartcontractlegalfirm.com
perfecshipping.com
aktarbaba.com
bulukx.com
wazolerino.info
account.farm
skstchers.com
perwiranusa.com
ourtown.directory
cuidomiforma.com
thecodestage.com
0898htt.com
yamalo.club
hdzj365.xyz
canaldotenis.com
idt-metrofireandsecurity.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4580-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3708 set thread context of 4580 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 97 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 4580 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 4580 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3708 wrote to memory of 2036 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 96 PID 3708 wrote to memory of 2036 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 96 PID 3708 wrote to memory of 2036 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 96 PID 3708 wrote to memory of 4580 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 97 PID 3708 wrote to memory of 4580 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 97 PID 3708 wrote to memory of 4580 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 97 PID 3708 wrote to memory of 4580 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 97 PID 3708 wrote to memory of 4580 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 97 PID 3708 wrote to memory of 4580 3708 e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe"2⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e752ae0abe724829b72a2df162596e66_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-