Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe
-
Size
837KB
-
MD5
f3a7017cd3bd289fcf75769b73de473d
-
SHA1
d6361efe1dcaf124118fc1315e081d698815b80f
-
SHA256
33b5454f7d305d2be3b59aef5cb73077820e63bb6f812358bd5f8a72c17cc5e6
-
SHA512
344a3d563fb14c1ceece19dde5e73c1bcba41e459f9308503af506cf3895364fe93e5b971d4bc43f302db461d60e7c032ba8f58d2c408cdfa22840d3e1044934
-
SSDEEP
12288:IYicjeYrA7Z/oR65AXwgFvuSSjImRQucjdhcSsBpnNZAuZcyFXTPp/pFc0b86XzU:IYooR6qg5Xm01BpjZcyFjB/pDBDpW
Malware Config
Extracted
xloader
2.3
adn9
suffrage19.com
desmareesmontantes.net
polishchuk-myroslava.com
compro-online.com
leadenhallstreettrustees.com
beixiyb.com
startlite.net
thewavelengthco.com
shop-sign-drive.com
angeliquestidhum.com
kaanins.com
reversemortgageloantexas.com
alveolo.net
everythingwholesalers.com
islacros.digital
bainrix.com
brittanyinbloom.com
zfezx08.com
yongqingfanhuali.com
gypsyjewelint.com
shopglamourwarehouse.com
univetsityhealthplans.com
conexoesrua.com
physio-now.com
we-cinema.com
therevenger.net
bambubiru.com
productstypicaldutch.com
highlandwhiskycorp.com
estefaniacosmetics.com
overlandingyoda.com
kolokation.com
barpigeon.com
karenlazarddesign.com
168wangdian.com
wenkewl.com
freefireinc.com
bisouxgirlkitchen.com
healthwatershed.com
votegriffin.com
studios-104.com
duuram.net
solitek.space
solidstateconceptsllc.com
goldstarsmoms.com
yogigirlfashion.com
simulasyondabugun.com
thehandymanplumbing.com
raped-my-dog.xyz
thoughtfulseniorcare.info
pandababywear.net
aguaspalacruda.com
vtnywvebj.club
ilvolantinodigitale.com
letsgetbiblicallyreal.com
bngcorp.com
planproduceprofit.com
theracetraumaagency.info
wealtheffectside.com
southendrunclub.com
moorecurnutt.info
teachmegcse.com
apartmentmarketingbrochures.com
xenoview.net
crlcefj.icu
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2928-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exedescription pid process target process PID 1420 set thread context of 2928 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exef3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exepid process 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 2928 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exedescription pid process target process PID 1420 wrote to memory of 2560 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe PID 1420 wrote to memory of 2560 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe PID 1420 wrote to memory of 2560 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe PID 1420 wrote to memory of 2560 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe PID 1420 wrote to memory of 2928 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe PID 1420 wrote to memory of 2928 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe PID 1420 wrote to memory of 2928 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe PID 1420 wrote to memory of 2928 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe PID 1420 wrote to memory of 2928 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe PID 1420 wrote to memory of 2928 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe PID 1420 wrote to memory of 2928 1420 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1420-6-0x0000000005760000-0x0000000005800000-memory.dmpFilesize
640KB
-
memory/1420-0-0x0000000000ED0000-0x0000000000FA8000-memory.dmpFilesize
864KB
-
memory/1420-2-0x0000000000DC0000-0x0000000000E00000-memory.dmpFilesize
256KB
-
memory/1420-3-0x0000000000910000-0x000000000092A000-memory.dmpFilesize
104KB
-
memory/1420-4-0x0000000074AE0000-0x00000000751CE000-memory.dmpFilesize
6.9MB
-
memory/1420-5-0x0000000000DC0000-0x0000000000E00000-memory.dmpFilesize
256KB
-
memory/1420-1-0x0000000074AE0000-0x00000000751CE000-memory.dmpFilesize
6.9MB
-
memory/1420-7-0x0000000000AE0000-0x0000000000B0E000-memory.dmpFilesize
184KB
-
memory/1420-13-0x0000000074AE0000-0x00000000751CE000-memory.dmpFilesize
6.9MB
-
memory/2928-9-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2928-8-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2928-12-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2928-14-0x0000000000A00000-0x0000000000D03000-memory.dmpFilesize
3.0MB
-
memory/2928-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB