Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe
-
Size
837KB
-
MD5
f3a7017cd3bd289fcf75769b73de473d
-
SHA1
d6361efe1dcaf124118fc1315e081d698815b80f
-
SHA256
33b5454f7d305d2be3b59aef5cb73077820e63bb6f812358bd5f8a72c17cc5e6
-
SHA512
344a3d563fb14c1ceece19dde5e73c1bcba41e459f9308503af506cf3895364fe93e5b971d4bc43f302db461d60e7c032ba8f58d2c408cdfa22840d3e1044934
-
SSDEEP
12288:IYicjeYrA7Z/oR65AXwgFvuSSjImRQucjdhcSsBpnNZAuZcyFXTPp/pFc0b86XzU:IYooR6qg5Xm01BpjZcyFjB/pDBDpW
Malware Config
Extracted
xloader
2.3
adn9
suffrage19.com
desmareesmontantes.net
polishchuk-myroslava.com
compro-online.com
leadenhallstreettrustees.com
beixiyb.com
startlite.net
thewavelengthco.com
shop-sign-drive.com
angeliquestidhum.com
kaanins.com
reversemortgageloantexas.com
alveolo.net
everythingwholesalers.com
islacros.digital
bainrix.com
brittanyinbloom.com
zfezx08.com
yongqingfanhuali.com
gypsyjewelint.com
shopglamourwarehouse.com
univetsityhealthplans.com
conexoesrua.com
physio-now.com
we-cinema.com
therevenger.net
bambubiru.com
productstypicaldutch.com
highlandwhiskycorp.com
estefaniacosmetics.com
overlandingyoda.com
kolokation.com
barpigeon.com
karenlazarddesign.com
168wangdian.com
wenkewl.com
freefireinc.com
bisouxgirlkitchen.com
healthwatershed.com
votegriffin.com
studios-104.com
duuram.net
solitek.space
solidstateconceptsllc.com
goldstarsmoms.com
yogigirlfashion.com
simulasyondabugun.com
thehandymanplumbing.com
raped-my-dog.xyz
thoughtfulseniorcare.info
pandababywear.net
aguaspalacruda.com
vtnywvebj.club
ilvolantinodigitale.com
letsgetbiblicallyreal.com
bngcorp.com
planproduceprofit.com
theracetraumaagency.info
wealtheffectside.com
southendrunclub.com
moorecurnutt.info
teachmegcse.com
apartmentmarketingbrochures.com
xenoview.net
crlcefj.icu
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2648-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1168 set thread context of 2648 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 92 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 2648 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 2648 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1068 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 91 PID 1168 wrote to memory of 1068 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 91 PID 1168 wrote to memory of 1068 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 91 PID 1168 wrote to memory of 2648 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 92 PID 1168 wrote to memory of 2648 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 92 PID 1168 wrote to memory of 2648 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 92 PID 1168 wrote to memory of 2648 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 92 PID 1168 wrote to memory of 2648 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 92 PID 1168 wrote to memory of 2648 1168 f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"2⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3a7017cd3bd289fcf75769b73de473d_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648
-