Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe
-
Size
303KB
-
MD5
fea794d22d11c7eda7af63545fc5f9ba
-
SHA1
7d30f8fa2652c0e36a82fbbf6a5995bdb1d056f9
-
SHA256
72320946e28ee9117b85cb1a83e5e122c3938e4a79c9be1551595103cb2c311a
-
SHA512
49d6b9c8b7ca35652a72f949bf4cdf5dc5f595391db052786a6333befde7dbf28afe3dd9fda177135dc90fd45c46c00826f8a936d1458e6d91b6cd146124da55
-
SSDEEP
6144:UDsmb8RHBESKs3hnD13HIMq/3WdCVdKrL:UD8WSKsBDpaWdCi/
Malware Config
Extracted
xloader
2.3
att3
oakbridgefundservices.com
fancyforts.com
coisadoce.com
learnfrommymentor.com
digitalgurughana.com
phk0.com
jantiprojeekspertiz.com
xiabyhuc.com
todayonly8.info
pgzapgmn.icu
sistemasarafranco.com
nest-estudio.com
2259.xyz
kenobi.tech
mortgageloansbyjeff.com
thameensa.com
navigators.digital
ecocleanmalta.com
advancedrecyclinginc.com
pmotriz.com
rjb355.xyz
theharbour1217.com
videomarketing.tips
quisroyalfactory.com
megatexxas.com
seedmanusa.com
niewiederpickel.net
dfhgiushds.xyz
womenshealthnewyork.com
mbhbuyingguide.com
cnaiyouyue.com
starcityrealty.homes
prepspiritwear.com
closingdesk.net
reintegrated.education
thedovaway.com
kutasureblue.com
arkhuman.com
iloverealstate.com
eating4mentalhealth.com
touchnoc.com
astrofriedchicken.com
wateristore.com
chloeallgeyer.com
herobet147.com
en-bmw-basvuruformu.com
otherneeds.com
chanek4.com
vn7snuk25.xyz
bifboawdq.icu
gofshoes.com
spartaplus.com
msmilkoskythemathematician.com
clublacey.com
visionchief.com
bestrefractor.com
newshopyou.com
theratesentinel.com
cunerier.com
theaustinsandalfactory.com
cisticron.com
bayhypesf.com
spanenter.net
loveofficial.net
travelscappadocia.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3532-51-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Drops startup file 2 IoCs
Processes:
PowerShell.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sfgdfgdfd.exe PowerShell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sfgdfgdfd.exe PowerShell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exedescription pid Process procid_target PID 544 set thread context of 3532 544 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 102 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
PowerShell.exefea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exepid Process 2804 PowerShell.exe 2804 PowerShell.exe 3532 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 3532 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PowerShell.exefea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 2804 PowerShell.exe Token: SeDebugPrivilege 544 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exedescription pid Process procid_target PID 544 wrote to memory of 2804 544 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 100 PID 544 wrote to memory of 2804 544 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 100 PID 544 wrote to memory of 2804 544 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 100 PID 544 wrote to memory of 3532 544 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 102 PID 544 wrote to memory of 3532 544 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 102 PID 544 wrote to memory of 3532 544 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 102 PID 544 wrote to memory of 3532 544 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 102 PID 544 wrote to memory of 3532 544 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 102 PID 544 wrote to memory of 3532 544 fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell" copy-item 'C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sfgdfgdfd.exe'2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fea794d22d11c7eda7af63545fc5f9ba_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82