Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 09:40
Static task
static1
Behavioral task
behavioral1
Sample
f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe
-
Size
704KB
-
MD5
f57bb0fe028ef8153ef5f35f49bc4814
-
SHA1
6097194ce764014cbc95fe96a1b4e2acccd33ab4
-
SHA256
f6f805093e3fcd072baf272acaa57da57ac20f7e686414a866e215817f4062e8
-
SHA512
30e2cbdf3628808c5425607bff5abe3888fc4925dd062a3b711ecf45e4424fc1f977ae5336d31c8209e2c979fffca71285643e7a1c3954ee403816fb643163de
-
SSDEEP
12288:QhJPU97PU9mso3htgYHOsBgo0q4wMsKwgPW1jPFmkxMeFk3orpXd7mPnjC6dvbWC:QhdYHOsBgo0q4wMsTgORgCMEmSXd7mmh
Malware Config
Extracted
xloader
2.3
p086
jinshichain.com
worldpettraveler.com
hightecforpc.com
kj97fm.com
streetnewstv.com
webrew.club
wheretogodubai.com
apostapolitica.net
thecafy.com
vinelosangeles.com
gashinc.com
gutitout.net
bvd-invest.com
realtoroutdesk.com
lawnbowlstournaments.net
nobodyisillegal.com
abogadoorihuela.net
sanistela.com
jksecurityworld.com
peppermintproject.com
blaxies3.com
oil51.com
joessche.com
7763.xyz
great-news-today.com
gen-oct.com
viyados.com
believe4america.com
misskarenenglishreacher.com
playgrnd.club
disseminate.info
degroeneremedie.com
clasedeangel.com
humanpossibilitiesfreed.com
lilythreads.com
6416drexel.com
jerseyshoreweedtees.com
eztrickstart.com
marionlittle.com
ecklesphoto.com
halifaxmews.com
carguymarkvan.com
cvpsychicmedium.com
greenlitebm.com
mainestreetwebdesign.com
wajvrko.icu
qbonitafesta.com
udsumberbarokah.com
maryschatzmd.com
leoscorpio.com
stashbashpartybus.com
bootlegnews.com
a1perfomance.com
publicofsociety.com
easybuy.cool
yhbt103.com
hereandnowme.com
proskinaesthetics.com
atminishop.com
dashcrew.net
4xpipsnager.com
ngmysz.com
moorestownquakerparents.com
maternity.cloud
riscology.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral1/memory/2220-3-0x0000000000350000-0x0000000000362000-memory.dmp CustAttr -
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exedescription pid process target process PID 2220 set thread context of 2360 2220 f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exepid process 2360 f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exedescription pid process target process PID 2220 wrote to memory of 2360 2220 f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe PID 2220 wrote to memory of 2360 2220 f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe PID 2220 wrote to memory of 2360 2220 f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe PID 2220 wrote to memory of 2360 2220 f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe PID 2220 wrote to memory of 2360 2220 f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe PID 2220 wrote to memory of 2360 2220 f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe PID 2220 wrote to memory of 2360 2220 f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f57bb0fe028ef8153ef5f35f49bc4814_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2220-6-0x0000000004BF0000-0x0000000004C6C000-memory.dmpFilesize
496KB
-
memory/2220-0-0x0000000001370000-0x0000000001426000-memory.dmpFilesize
728KB
-
memory/2220-2-0x0000000004CD0000-0x0000000004D10000-memory.dmpFilesize
256KB
-
memory/2220-3-0x0000000000350000-0x0000000000362000-memory.dmpFilesize
72KB
-
memory/2220-4-0x0000000074180000-0x000000007486E000-memory.dmpFilesize
6.9MB
-
memory/2220-5-0x0000000004CD0000-0x0000000004D10000-memory.dmpFilesize
256KB
-
memory/2220-1-0x0000000074180000-0x000000007486E000-memory.dmpFilesize
6.9MB
-
memory/2220-7-0x0000000000D20000-0x0000000000D54000-memory.dmpFilesize
208KB
-
memory/2220-15-0x0000000074180000-0x000000007486E000-memory.dmpFilesize
6.9MB
-
memory/2360-10-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2360-8-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2360-14-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2360-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2360-16-0x0000000000840000-0x0000000000B43000-memory.dmpFilesize
3.0MB