Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe
-
Size
763KB
-
MD5
f26c94499e75a2ef55d35ea0a0d2d66f
-
SHA1
cb863e15848e6665bf6e750de68acd1282e83941
-
SHA256
090bc9b1aab3f3efacd0afb55b204001290e87aaf9ddd526e298877b0eb6f416
-
SHA512
cb0060e64076197606b5d70bad4fdc49fcaf731a78e274d03df7e61c01b08b35efcc018e0d18bac31a15b170b3a9b35a5af67a269a21f742fa01534842cc619f
-
SSDEEP
12288:e5kvqoB4sZ/Bk6Nl0mN/FRk0bKB0XHEmedF6Hv4AnEzcJqLZ5yt:aXoBZZ/Bk6Nl0y/3k0bKB0XH6UHqNk
Malware Config
Extracted
xloader
2.3
n8ba
thefitflect.com
anytourist.com
blggz.xyz
ascope.club
obyeboss.com
braun-mathematik.online
mtsnurulislamsby.com
jwpropertiestn.com
animalds.com
cunerier.com
sillysocklife.com
shopliyonamaaghin.net
theredcymbalsco.com
lostbikeproject.com
ryggoqlmga.club
realestatetriggers.com
luvlauricephotography.com
cheesehome.cloud
5fashionfix.net
wata-6-rwem.net
ominvestment.net
rrinuwsq643do2.xyz
teamtacozzzz.com
newjerseyreosales.com
theresahovo.com
wowmovies.today
77k6tgikpbs39.net
americagoldenwheels.com
digitaladbasket.com
gcagame.com
arielatkins.net
2020coaches.com
effthisshit.com
nycabl.com
fbvanminh.com
lovebirdsgifts.com
anxietyxpill.com
recaptcha-lnc.com
aprendelspr.com
expatinsur.com
backtothesimplethings.com
pcf-it.services
wintonplaceoh.com
designermotherhood.com
naamt.com
lifestylebykendra.com
thehighstatusemporium.com
oneninelacrosse.com
mariasmoworldwide.com
kitesurf-piraten.net
atelierbond.com
mynjelderlaw.com
moucopia.com
hauhome.club
imroundtable.com
thralink.com
baoequities.com
nassy.cloud
goldenstatelabradoodles.com
revenueremedyintensive.com
dfendglobal.com
pugliaandgastronomy.com
cypios.net
trinioware.com
narrowpathwc.com
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/2768-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2768-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1404-27-0x0000000000350000-0x0000000000379000-memory.dmp xloader behavioral2/memory/1404-29-0x0000000000350000-0x0000000000379000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1344 set thread context of 2768 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 97 PID 2768 set thread context of 3512 2768 MSBuild.exe 56 PID 1404 set thread context of 3512 1404 colorcpl.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 2768 MSBuild.exe 2768 MSBuild.exe 2768 MSBuild.exe 2768 MSBuild.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe 1404 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2768 MSBuild.exe 2768 MSBuild.exe 2768 MSBuild.exe 1404 colorcpl.exe 1404 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe Token: SeDebugPrivilege 2768 MSBuild.exe Token: SeDebugPrivilege 1404 colorcpl.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3512 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2836 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 95 PID 1344 wrote to memory of 2836 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 95 PID 1344 wrote to memory of 2836 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 95 PID 1344 wrote to memory of 2768 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 97 PID 1344 wrote to memory of 2768 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 97 PID 1344 wrote to memory of 2768 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 97 PID 1344 wrote to memory of 2768 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 97 PID 1344 wrote to memory of 2768 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 97 PID 1344 wrote to memory of 2768 1344 f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe 97 PID 3512 wrote to memory of 1404 3512 Explorer.EXE 98 PID 3512 wrote to memory of 1404 3512 Explorer.EXE 98 PID 3512 wrote to memory of 1404 3512 Explorer.EXE 98 PID 1404 wrote to memory of 4312 1404 colorcpl.exe 99 PID 1404 wrote to memory of 4312 1404 colorcpl.exe 99 PID 1404 wrote to memory of 4312 1404 colorcpl.exe 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f26c94499e75a2ef55d35ea0a0d2d66f_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vKuEoqencJkh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4978.tmp"3⤵
- Creates scheduled task(s)
PID:2836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:4312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5192660335fc827a68e7bacab17b7dc20
SHA149a3d405135a37067fd199c8865cd755728f45f3
SHA2568242455af82328d975f2f38ec519527f1ba6be1e6c9d259162107a6fbf84f1a2
SHA512de9a08428d86ed2f930268026b60ce461a5bfaef9b5339f046e3188af2a2a81dda460a90632a07a4c9731dfb16a4fca73ca04609714743248972065020930f6e