Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe
-
Size
763KB
-
MD5
f26c94499e75a2ef55d35ea0a0d2d66f
-
SHA1
cb863e15848e6665bf6e750de68acd1282e83941
-
SHA256
090bc9b1aab3f3efacd0afb55b204001290e87aaf9ddd526e298877b0eb6f416
-
SHA512
cb0060e64076197606b5d70bad4fdc49fcaf731a78e274d03df7e61c01b08b35efcc018e0d18bac31a15b170b3a9b35a5af67a269a21f742fa01534842cc619f
-
SSDEEP
12288:e5kvqoB4sZ/Bk6Nl0mN/FRk0bKB0XHEmedF6Hv4AnEzcJqLZ5yt:aXoBZZ/Bk6Nl0y/3k0bKB0XH6UHqNk
Malware Config
Extracted
xloader
2.3
n8ba
thefitflect.com
anytourist.com
blggz.xyz
ascope.club
obyeboss.com
braun-mathematik.online
mtsnurulislamsby.com
jwpropertiestn.com
animalds.com
cunerier.com
sillysocklife.com
shopliyonamaaghin.net
theredcymbalsco.com
lostbikeproject.com
ryggoqlmga.club
realestatetriggers.com
luvlauricephotography.com
cheesehome.cloud
5fashionfix.net
wata-6-rwem.net
ominvestment.net
rrinuwsq643do2.xyz
teamtacozzzz.com
newjerseyreosales.com
theresahovo.com
wowmovies.today
77k6tgikpbs39.net
americagoldenwheels.com
digitaladbasket.com
gcagame.com
arielatkins.net
2020coaches.com
effthisshit.com
nycabl.com
fbvanminh.com
lovebirdsgifts.com
anxietyxpill.com
recaptcha-lnc.com
aprendelspr.com
expatinsur.com
backtothesimplethings.com
pcf-it.services
wintonplaceoh.com
designermotherhood.com
naamt.com
lifestylebykendra.com
thehighstatusemporium.com
oneninelacrosse.com
mariasmoworldwide.com
kitesurf-piraten.net
atelierbond.com
mynjelderlaw.com
moucopia.com
hauhome.club
imroundtable.com
thralink.com
baoequities.com
nassy.cloud
goldenstatelabradoodles.com
revenueremedyintensive.com
dfendglobal.com
pugliaandgastronomy.com
cypios.net
trinioware.com
narrowpathwc.com
Signatures
-
Xloader payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2828-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2828-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2656-26-0x0000000000080000-0x00000000000A9000-memory.dmp xloader behavioral1/memory/2656-28-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exeMSBuild.exeNETSTAT.EXEdescription pid process target process PID 2916 set thread context of 2828 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2828 set thread context of 1256 2828 MSBuild.exe Explorer.EXE PID 2656 set thread context of 1256 2656 NETSTAT.EXE Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 2656 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exeMSBuild.exeNETSTAT.EXEpid process 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 2828 MSBuild.exe 2828 MSBuild.exe 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE 2656 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
MSBuild.exeNETSTAT.EXEpid process 2828 MSBuild.exe 2828 MSBuild.exe 2828 MSBuild.exe 2656 NETSTAT.EXE 2656 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exeMSBuild.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe Token: SeDebugPrivilege 2828 MSBuild.exe Token: SeDebugPrivilege 2656 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 2916 wrote to memory of 2732 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe schtasks.exe PID 2916 wrote to memory of 2732 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe schtasks.exe PID 2916 wrote to memory of 2732 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe schtasks.exe PID 2916 wrote to memory of 2732 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe schtasks.exe PID 2916 wrote to memory of 2736 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2736 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2736 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2736 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2456 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2456 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2456 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2456 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2828 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2828 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2828 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2828 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2828 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2828 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 2916 wrote to memory of 2828 2916 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe MSBuild.exe PID 1256 wrote to memory of 2656 1256 Explorer.EXE NETSTAT.EXE PID 1256 wrote to memory of 2656 1256 Explorer.EXE NETSTAT.EXE PID 1256 wrote to memory of 2656 1256 Explorer.EXE NETSTAT.EXE PID 1256 wrote to memory of 2656 1256 Explorer.EXE NETSTAT.EXE PID 2656 wrote to memory of 2644 2656 NETSTAT.EXE cmd.exe PID 2656 wrote to memory of 2644 2656 NETSTAT.EXE cmd.exe PID 2656 wrote to memory of 2644 2656 NETSTAT.EXE cmd.exe PID 2656 wrote to memory of 2644 2656 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vKuEoqencJkh" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB70F.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpB70F.tmpFilesize
1KB
MD56ff05d22bc6a420db5eacc3cd151f5a0
SHA1555823487253430e8331b51e3ee4ffeddb36712d
SHA256c378c81c301d05bb15912d972c61f3af892608e9e5d4a948c608b3114d716d49
SHA512b058e767cb68be99b3a6e47de1398abe260abd7e6ef43f9f1450bbf738f457dcd99ea901581ccc3c94373ffeef34a0b2dc5bf4eebc6e17b251cc97b4013a5e31
-
memory/1256-20-0x0000000003A20000-0x0000000003B20000-memory.dmpFilesize
1024KB
-
memory/1256-23-0x00000000047A0000-0x000000000488A000-memory.dmpFilesize
936KB
-
memory/2656-30-0x0000000001EC0000-0x0000000001F50000-memory.dmpFilesize
576KB
-
memory/2656-28-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/2656-27-0x00000000021F0000-0x00000000024F3000-memory.dmpFilesize
3.0MB
-
memory/2656-26-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/2656-25-0x0000000000790000-0x0000000000799000-memory.dmpFilesize
36KB
-
memory/2656-24-0x0000000000790000-0x0000000000799000-memory.dmpFilesize
36KB
-
memory/2828-22-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2828-13-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2828-15-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/2828-16-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2828-19-0x0000000000700000-0x0000000000A03000-memory.dmpFilesize
3.0MB
-
memory/2828-14-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2828-21-0x0000000000430000-0x0000000000441000-memory.dmpFilesize
68KB
-
memory/2916-17-0x0000000074260000-0x000000007494E000-memory.dmpFilesize
6.9MB
-
memory/2916-7-0x00000000009C0000-0x00000000009F0000-memory.dmpFilesize
192KB
-
memory/2916-0-0x00000000001C0000-0x0000000000286000-memory.dmpFilesize
792KB
-
memory/2916-6-0x0000000005880000-0x000000000591E000-memory.dmpFilesize
632KB
-
memory/2916-5-0x0000000005060000-0x00000000050A0000-memory.dmpFilesize
256KB
-
memory/2916-4-0x0000000074260000-0x000000007494E000-memory.dmpFilesize
6.9MB
-
memory/2916-3-0x00000000004E0000-0x00000000004F2000-memory.dmpFilesize
72KB
-
memory/2916-2-0x0000000005060000-0x00000000050A0000-memory.dmpFilesize
256KB
-
memory/2916-1-0x0000000074260000-0x000000007494E000-memory.dmpFilesize
6.9MB