Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe
-
Size
345KB
-
MD5
fd30d28fcbcb1355343d594752b78772
-
SHA1
33cb0811591d84b68ce5cb07e1050e4dea0ce6cf
-
SHA256
d00f87049fb2c7cbbf506ca2361e8295fe06926f17e1d2c16cfe3e88a2902f5a
-
SHA512
5367ea6f2fea98f3942abc25b0c628d34443280f90eeae3d22d10686b428113237dd5708160ee5c790dc12c14a3a5b3505afc2c143d1392b93949cf3749e0f6b
-
SSDEEP
6144:5CU7yTJH63y+Ah44w19QG3pLKSiUZrNVfs8V:oU7sOp4nS9QuNN2
Malware Config
Extracted
xloader
2.3
iq3g
itbcx.com
katielegget.com
myneighorsbasement.com
charts.wiki
toricolucci.com
ntlichengmodel.com
onsaleja.com
nailsbyleentje.com
freya-lux.com
moodyblack.com
mseoljaehwi.com
successfulsend.com
dr-roach.com
nargilegalerisi.com
animalhoney.com
indiarankers.com
botcantaysitokata.club
okinawakurashinavi.com
ceev-japan.com
shsqyy.com
simplenorwegian.com
sbnl.net
thethrive-master.com
thesayge.com
kuppers.info
maxiguias.com
huiigo.com
060986.com
themedicarebenefits.com
facegamex.com
tortanuragica.com
lostgunsofaz.com
ubodylines.com
himomall.com
ftldm.com
kupfererforcoroner.com
thevortexny.com
prismabilisim.com
newparadisedallyshome.com
buymorerei.com
mymtube.com
brightfuture.network
dewadurian.com
collegesportsagency.com
fallsguys-mobile.com
scdcs.net
gedejasa.com
pupiscatering.com
thehealingpharm.com
kansascityradonpro.com
computertechhouse.club
proteinmunch.com
azdieselhd.com
thepoetjewelry.com
hustlerhotrods.net
kt.digital
proseandconn.com
betterlife-247.com
listoflodges.net
funkysouptimetv.com
lpdautosupply.com
themalayalinewsclub.com
kindredhearteams.com
flagsmile.com
mojoprintable.com
Signatures
-
Xloader payload 2 IoCs
resource yara_rule behavioral2/memory/4376-2-0x00000000016E0000-0x000000000170A000-memory.dmp xloader behavioral2/memory/1760-3-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4376 set thread context of 1760 4376 fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1760 fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe 1760 fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4376 wrote to memory of 1760 4376 fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe 88 PID 4376 wrote to memory of 1760 4376 fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe 88 PID 4376 wrote to memory of 1760 4376 fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe 88 PID 4376 wrote to memory of 1760 4376 fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe 88 PID 4376 wrote to memory of 1760 4376 fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe 88 PID 4376 wrote to memory of 1760 4376 fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd30d28fcbcb1355343d594752b78772_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-