Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe
-
Size
303KB
-
MD5
fea794d22d11c7eda7af63545fc5f9ba
-
SHA1
7d30f8fa2652c0e36a82fbbf6a5995bdb1d056f9
-
SHA256
72320946e28ee9117b85cb1a83e5e122c3938e4a79c9be1551595103cb2c311a
-
SHA512
49d6b9c8b7ca35652a72f949bf4cdf5dc5f595391db052786a6333befde7dbf28afe3dd9fda177135dc90fd45c46c00826f8a936d1458e6d91b6cd146124da55
-
SSDEEP
6144:UDsmb8RHBESKs3hnD13HIMq/3WdCVdKrL:UD8WSKsBDpaWdCi/
Malware Config
Extracted
xloader
2.3
att3
oakbridgefundservices.com
fancyforts.com
coisadoce.com
learnfrommymentor.com
digitalgurughana.com
phk0.com
jantiprojeekspertiz.com
xiabyhuc.com
todayonly8.info
pgzapgmn.icu
sistemasarafranco.com
nest-estudio.com
2259.xyz
kenobi.tech
mortgageloansbyjeff.com
thameensa.com
navigators.digital
ecocleanmalta.com
advancedrecyclinginc.com
pmotriz.com
rjb355.xyz
theharbour1217.com
videomarketing.tips
quisroyalfactory.com
megatexxas.com
seedmanusa.com
niewiederpickel.net
dfhgiushds.xyz
womenshealthnewyork.com
mbhbuyingguide.com
cnaiyouyue.com
starcityrealty.homes
prepspiritwear.com
closingdesk.net
reintegrated.education
thedovaway.com
kutasureblue.com
arkhuman.com
iloverealstate.com
eating4mentalhealth.com
touchnoc.com
astrofriedchicken.com
wateristore.com
chloeallgeyer.com
herobet147.com
en-bmw-basvuruformu.com
otherneeds.com
chanek4.com
vn7snuk25.xyz
bifboawdq.icu
gofshoes.com
spartaplus.com
msmilkoskythemathematician.com
clublacey.com
visionchief.com
bestrefractor.com
newshopyou.com
theratesentinel.com
cunerier.com
theaustinsandalfactory.com
cisticron.com
bayhypesf.com
spanenter.net
loveofficial.net
travelscappadocia.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2596-40-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Drops startup file 2 IoCs
Processes:
PowerShell.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sfgdfgdfd.exe PowerShell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sfgdfgdfd.exe PowerShell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exedescription pid Process procid_target PID 2352 set thread context of 2596 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 31 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exePowerShell.exefea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exepid Process 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 2108 PowerShell.exe 2596 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exePowerShell.exedescription pid Process Token: SeDebugPrivilege 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe Token: SeDebugPrivilege 2108 PowerShell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exedescription pid Process procid_target PID 2352 wrote to memory of 2108 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2108 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2108 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2108 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2604 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 30 PID 2352 wrote to memory of 2604 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 30 PID 2352 wrote to memory of 2604 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 30 PID 2352 wrote to memory of 2604 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 30 PID 2352 wrote to memory of 2596 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2596 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2596 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2596 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2596 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2596 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2596 2352 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell" copy-item 'C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sfgdfgdfd.exe'2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe"2⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-