Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe
-
Size
253KB
-
MD5
fdb8b9c8056a552461e493d3f1b4b2d8
-
SHA1
87ea5998b4f6831c99bdce8cd48d3c238833d2c7
-
SHA256
e33f9dbf56b2850d44ff3f6dff7b0631abbc52836b97cc41c4e4907538ed749a
-
SHA512
59217111d51a555867dac4df8e3e609706d671d1802f8c70daad3f913965dcb10cca6d878a3963e1aff7527628c7392de6b95fbf72564227a1d0b8ddea99a1b9
-
SSDEEP
6144:bd53TvpHeIl0SQCoocCvKrcIxJYAsXfpuUVbbNGw411hwpXHRqjoEt60R0bAM:bd53TvpHeIl0SVoA83YAAuUV/AHhQgPu
Malware Config
Extracted
xloader
2.3
um8e
theypretend.com
hopeschildren.com
kuly.cloud
maniflexx.net
bedtimesocietyblog.com
spenglerwetlandpreserve.com
unity-play.net
bonap56.com
consciencevc.com
deluxeluxe.com
officialjuliep.com
cttrade.club
quietflyt.com
mcabspl.com
lippocaritahotel.com
tolanfilms.xyz
momenaagro.com
slingshotart.com
thefoundershuddle.com
mobilbaris.com
castlerockbotanicals.com
dautusim.com
tolteca.club
saddletaxweigh.info
oxydiumcorp.com
themiamadison.com
888luckys.net
brandsuggestion.com
jusdra.com
therios.net
helpushelpothersstore.com
pornometal.com
whejvrehj.com
ngzhaohern.com
slaskie.pro
heuristicadg.com
angrybird23blog.com
my-bmi.space
lufral.com
influenced-brands.com
vicdux.life
top1opp.com
techiedrill.com
sitedesing.com
bigtittylesbians.com
xspinworks14.com
alturadesingfit.com
venturivasiljevic.com
yxsj.info
yorkshirebridalmakeup.info
shopinnocenceeyejai.com
yinhangli.com
tickimumm.com
xn--939am40byoeizq.com
customerservuce.com
blendoriginal.com
freelancebizquiz.com
matjar-lik.com
bellaxxocosmetics.com
gxdazj.com
findbriefmarken.com
pubgevents1.com
metis.network
eternapure.net
jiltedowl.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2484-3-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exedescription pid Process procid_target PID 1952 set thread context of 2484 1952 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe 28 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2844 1952 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exepid Process 2484 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exepid Process 1952 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exedescription pid Process procid_target PID 1952 wrote to memory of 2484 1952 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe 28 PID 1952 wrote to memory of 2484 1952 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe 28 PID 1952 wrote to memory of 2484 1952 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe 28 PID 1952 wrote to memory of 2484 1952 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe 28 PID 1952 wrote to memory of 2484 1952 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe 28 PID 1952 wrote to memory of 2844 1952 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe 29 PID 1952 wrote to memory of 2844 1952 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe 29 PID 1952 wrote to memory of 2844 1952 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe 29 PID 1952 wrote to memory of 2844 1952 fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdb8b9c8056a552461e493d3f1b4b2d8_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1402⤵
- Program crash
PID:2844
-