Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe
-
Size
524KB
-
MD5
fd45b4fe49d0e8c38c34fdd1bdad1dda
-
SHA1
955da56927ee2d3afe02a1cef22d7384fe7066eb
-
SHA256
5d5aa4f1afaa9dd98bc1317f5b8e190cf21130d465da575fac9d4fbc6b3fb3af
-
SHA512
dffd9842de31f170c2f6d22cf067ad7f4aacd97011f0d5751071baa9011fcab90a1e6e21c3301241107efbd8b0aa40707dde0e7003082ff41cb08cdfcdc56589
-
SSDEEP
12288:9E+M7a6xtv2uMblHYqZ8kr6Z+A2skebXul0tGsucD3SB:K+NctvvalY5e6xD30sucDiB
Malware Config
Extracted
xloader
2.5
b5ce
advellerd.xyz
giasuvina.com
arab-xt-pro.com
ahsltu2ua4.com
trasportesemmanuel.com
kissimmeesoccercup.com
studyengland.com
m2volleyballclub.com
shyuehuan.com
elsml.com
blog-x-history.top
coditeu.com
allattachments.net
vigautruc.com
mentication.com
zambiaedu.xyz
filadelfiacenter.com
avlaborsourceinc.info
tameka-stewart.com
studio-cleo.com
cruisebookingsonlineukweb.com
bajajfinservmutualfund.com
bipxtech.cloud
glottogon.com
villamante.com
lvfrm.xyz
bhadanamedia.digital
austindemolitioncontractor.com
nutritionhawks.com
vcmalihx.top
busybstickerco.com
lianshangtron.com
tenncreative.com
charmfulland.com
zuridesire.com
vliegenmetplezier.com
khlopok.club
tovardarom.xyz
atmospheraglobal.com
lakeefctmich.com
novasaude-g1.online
joymort.com
allexceptionalcapital.com
balicoffeeuniversal.com
netjyjin26.net
arpdomestic.com
ozglobetips.online
zeogg.club
josiemaran-supernatural.com
sieuthinhapkhau.store
healthonline.store
coiincrypt.com
fofija.com
yshowmedia.com
enhancedcr.com
tous-des-cons.club
holeinthewallbus.com
okssl.net
gutenstocks.com
thelindleyfamily.com
apexpropertiesltd.com
powerhousetepusa.com
urbanopportunities.com
comarch.tech
rheilea.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3828-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exedescription pid process target process PID 4288 set thread context of 3828 4288 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exepid process 3828 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe 3828 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exedescription pid process target process PID 4288 wrote to memory of 3828 4288 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe PID 4288 wrote to memory of 3828 4288 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe PID 4288 wrote to memory of 3828 4288 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe PID 4288 wrote to memory of 3828 4288 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe PID 4288 wrote to memory of 3828 4288 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe PID 4288 wrote to memory of 3828 4288 fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd45b4fe49d0e8c38c34fdd1bdad1dda_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3828-11-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3828-15-0x00000000017F0000-0x0000000001B3A000-memory.dmpFilesize
3.3MB
-
memory/3828-14-0x00000000017F0000-0x0000000001B3A000-memory.dmpFilesize
3.3MB
-
memory/4288-6-0x0000000005500000-0x000000000550A000-memory.dmpFilesize
40KB
-
memory/4288-4-0x0000000005280000-0x000000000528A000-memory.dmpFilesize
40KB
-
memory/4288-5-0x0000000005550000-0x0000000005560000-memory.dmpFilesize
64KB
-
memory/4288-1-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/4288-7-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/4288-8-0x0000000005550000-0x0000000005560000-memory.dmpFilesize
64KB
-
memory/4288-9-0x0000000006890000-0x000000000692C000-memory.dmpFilesize
624KB
-
memory/4288-10-0x0000000006C80000-0x0000000006CF6000-memory.dmpFilesize
472KB
-
memory/4288-3-0x00000000052F0000-0x0000000005382000-memory.dmpFilesize
584KB
-
memory/4288-13-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/4288-2-0x0000000005800000-0x0000000005DA4000-memory.dmpFilesize
5.6MB
-
memory/4288-0-0x0000000000840000-0x00000000008CA000-memory.dmpFilesize
552KB