Analysis
-
max time kernel
168s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe
-
Size
539KB
-
MD5
f62df66e02f1a6d000acd5bd02eba7c4
-
SHA1
20bb7c20bbff390a88da1e88942110459f3be3f3
-
SHA256
debc44004d1383a588955e4f11ee66089b302bf041d127470927206642ed35ad
-
SHA512
b17d0bbd97b91fc2c0fc0268d4a0a52570cb70515d1dae8fc697fb531a45b5dbd8c50711ebc05fe7cfb5d2bf81dbe4cc0e58e0603f55883eca42d586d845824d
-
SSDEEP
12288:Avp+gczyhNSvRbBQHR4qz91hI0zSaNsvz+yuWDVId21NaI+E8tyvX9xhobZfoNdb:FWfUdl1y6slERzzuFAn
Malware Config
Extracted
xloader
2.3
m8uk
corona-mid.com
diatomitetk.com
douyinlanv.info
shaloodeh-bana-ofogh.com
maggierosscats.com
homemadeearring.com
thanhnepgiay.net
orphanscode.net
betterchariot.com
sexforty.com
ceoclubnepal.com
messinacon.com
zaracollections.com
sportsonedeals.com
pooksapotheca.com
android-trust.com
thefilipinoairfryercookbook.com
winouwin.net
theurbanpreserve.com
rbmworld.com
theblueprint.design
dietandocomsaude.com
settleit.finance
sygsytl.com
kismetestate.com
simonethemanintheblueshirt.com
funkymonkeysoup.com
yiliyl.com
elizabethheydeck.com
jessieandgrumpygnome.com
blackoakvineyard.com
aitatataimazeki.com
maleonas.com
ulttrak.com
kieransplumbingandgas.com
magetu.info
mariannemoorephoto.com
310172.com
amzaccount-lockedsecure.com
simplybrandy.com
yanlan5588.com
donaldshart.com
micronixstore.com
lwaynebrown.com
zysycar.com
lazymaobi.com
equashareplus.com
mosttrustednameinews.com
safehaustech.com
aev-association.com
mallorcavermietungen.com
are-powerful.com
yammifood.com
lycpapp77.com
the-test.website
kumasihemp.com
chrispstudio.com
onelovealliance.com
therealrefinery.com
fastermachines.com
sportsgamelovers.com
xwuin.store
plaqad.net
solaiareviews.com
thesato.net
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/2308-10-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2308-15-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2996-20-0x0000000000D70000-0x0000000000D98000-memory.dmp xloader behavioral2/memory/2996-22-0x0000000000D70000-0x0000000000D98000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2092 set thread context of 2308 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 101 PID 2308 set thread context of 3532 2308 RegSvcs.exe 57 PID 2996 set thread context of 3532 2996 chkdsk.exe 57 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 2308 RegSvcs.exe 2308 RegSvcs.exe 2308 RegSvcs.exe 2308 RegSvcs.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe 2996 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2308 RegSvcs.exe 2308 RegSvcs.exe 2308 RegSvcs.exe 2996 chkdsk.exe 2996 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe Token: SeDebugPrivilege 2308 RegSvcs.exe Token: SeDebugPrivilege 2996 chkdsk.exe Token: SeShutdownPrivilege 3532 Explorer.EXE Token: SeCreatePagefilePrivilege 3532 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2340 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 100 PID 2092 wrote to memory of 2340 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 100 PID 2092 wrote to memory of 2340 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 100 PID 2092 wrote to memory of 2308 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 101 PID 2092 wrote to memory of 2308 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 101 PID 2092 wrote to memory of 2308 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 101 PID 2092 wrote to memory of 2308 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 101 PID 2092 wrote to memory of 2308 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 101 PID 2092 wrote to memory of 2308 2092 f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe 101 PID 3532 wrote to memory of 2996 3532 Explorer.EXE 102 PID 3532 wrote to memory of 2996 3532 Explorer.EXE 102 PID 3532 wrote to memory of 2996 3532 Explorer.EXE 102 PID 2996 wrote to memory of 1052 2996 chkdsk.exe 103 PID 2996 wrote to memory of 1052 2996 chkdsk.exe 103 PID 2996 wrote to memory of 1052 2996 chkdsk.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f62df66e02f1a6d000acd5bd02eba7c4_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵PID:2340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1052
-
-