Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-04-2024 22:55
Static task
static1
Behavioral task
behavioral1
Sample
efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/rzvd.dll
Resource
win7-20240221-en
General
-
Target
efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe
-
Size
660KB
-
MD5
efb464ece5f5aa332a60d241aa93a74f
-
SHA1
1b07ef42b7d91b71600f7512e6eb7248510b2330
-
SHA256
7384a61fc69ce24610f7c4658c2ef8786c4cdc5d6ad6b33d1a9f506d6b6388d3
-
SHA512
86c4b630151a648ed004e543996eba2d9a54dfb14de71b1f38f2e4fe4881c4e2a8b7e2c7f6c52876d8f3eb4406b0c12c349861e024de40568306b3505bd3ef82
-
SSDEEP
6144:h8LxB/WPFi3n+dwNOOGAmuDkM+fcA3RNNJzYTwXF0WmZfml7WcXg6tFI:vCNOUHkMgc8zN0Wmhs7kj
Malware Config
Extracted
xloader
2.5
ons6
946acc.net
ilkermulla.com
edificationhub.com
aptbaby.com
luisrgonzalez.com
postandpine.com
objective-object.com
storeydrive.rentals
mobile-find.com
africanbridaluk.com
zzjn12.xyz
ritechoiceinvestmentgroup.com
zitzies.xyz
trulyproofreading.com
ktndetermine.xyz
advertising.land
keywordgomuwk.xyz
niecliomusicspirit.com
lhortelecom.com
cryptochieftan.com
fumctulsa.com
librariumclub.com
tinturas-espagiricas.com
regencyimperial.com
worldremirt.com
nikurei.com
edukado.online
med2cloud.com
sasktwl.net
ancditalia.com
nagukoohatomo.xyz
febfit.com
brasbux.com
bilinili236.xyz
girlxyz.com
trm.computer
studiomuis.com
pinnap.online
ra-hanbaiten-lulusia.xyz
desso.one
devilsheartdesign.com
gestproducts.com
mount-motion.com
miltonjorge.net
xiaomiyp6.com
rurikon2.com
wwwmwrfinancial.com
mikexktolsd.com
businessim.net
algoescrow.com
bitterbaybay.com
acidulante.com
yourchancemarketing.com
accidental-blogger.com
breastcancerforumbd.com
viellacharteredland.com
wkefaromaticum.com
guardianenergy.group
gamblersprintcars.com
midiff.com
firstbymel.com
fdwqw.xyz
ngatihaukoporeihana.com
pictureballthose.top
parasitevhs.net
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2060-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 2 IoCs
pid Process 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 2772 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2276 set thread context of 2060 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2772 2276 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2060 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2060 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2060 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2060 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2060 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2060 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2060 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2060 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2772 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 29 PID 2276 wrote to memory of 2772 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 29 PID 2276 wrote to memory of 2772 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 29 PID 2276 wrote to memory of 2772 2276 efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 4922⤵
- Loads dropped DLL
- Program crash
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5d255169c5e130e0104b01f2ceb04c885
SHA1e9a0bf4c711f63829fb077b75b57a14b6bdda4bc
SHA25666c07a5eb743d77deff8b16a8cbcc1be0795df5197874f23fd440fbf0cae38a8
SHA51215f54c5f3de381c4b935886bd120d1e4ab609109015b6b49b842aa34b465467706ac79e0b8ad0961046e841e8e352df2a12b70653c960115e6ff92c4b282605e