Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe
-
Size
524KB
-
MD5
fd45b4fe49d0e8c38c34fdd1bdad1dda
-
SHA1
955da56927ee2d3afe02a1cef22d7384fe7066eb
-
SHA256
5d5aa4f1afaa9dd98bc1317f5b8e190cf21130d465da575fac9d4fbc6b3fb3af
-
SHA512
dffd9842de31f170c2f6d22cf067ad7f4aacd97011f0d5751071baa9011fcab90a1e6e21c3301241107efbd8b0aa40707dde0e7003082ff41cb08cdfcdc56589
-
SSDEEP
12288:9E+M7a6xtv2uMblHYqZ8kr6Z+A2skebXul0tGsucD3SB:K+NctvvalY5e6xD30sucDiB
Malware Config
Extracted
xloader
2.5
b5ce
advellerd.xyz
giasuvina.com
arab-xt-pro.com
ahsltu2ua4.com
trasportesemmanuel.com
kissimmeesoccercup.com
studyengland.com
m2volleyballclub.com
shyuehuan.com
elsml.com
blog-x-history.top
coditeu.com
allattachments.net
vigautruc.com
mentication.com
zambiaedu.xyz
filadelfiacenter.com
avlaborsourceinc.info
tameka-stewart.com
studio-cleo.com
cruisebookingsonlineukweb.com
bajajfinservmutualfund.com
bipxtech.cloud
glottogon.com
villamante.com
lvfrm.xyz
bhadanamedia.digital
austindemolitioncontractor.com
nutritionhawks.com
vcmalihx.top
busybstickerco.com
lianshangtron.com
tenncreative.com
charmfulland.com
zuridesire.com
vliegenmetplezier.com
khlopok.club
tovardarom.xyz
atmospheraglobal.com
lakeefctmich.com
novasaude-g1.online
joymort.com
allexceptionalcapital.com
balicoffeeuniversal.com
netjyjin26.net
arpdomestic.com
ozglobetips.online
zeogg.club
josiemaran-supernatural.com
sieuthinhapkhau.store
healthonline.store
coiincrypt.com
fofija.com
yshowmedia.com
enhancedcr.com
tous-des-cons.club
holeinthewallbus.com
okssl.net
gutenstocks.com
thelindleyfamily.com
apexpropertiesltd.com
powerhousetepusa.com
urbanopportunities.com
comarch.tech
rheilea.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2664-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exedescription pid Process procid_target PID 1964 set thread context of 2664 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exefd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exepid Process 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 2664 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exedescription pid Process procid_target PID 1964 wrote to memory of 2648 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 28 PID 1964 wrote to memory of 2648 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 28 PID 1964 wrote to memory of 2648 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 28 PID 1964 wrote to memory of 2648 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 28 PID 1964 wrote to memory of 2664 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 29 PID 1964 wrote to memory of 2664 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 29 PID 1964 wrote to memory of 2664 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 29 PID 1964 wrote to memory of 2664 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 29 PID 1964 wrote to memory of 2664 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 29 PID 1964 wrote to memory of 2664 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 29 PID 1964 wrote to memory of 2664 1964 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe"2⤵PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-