Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe
-
Size
935KB
-
MD5
fe93fd7b777639146c4927a698ab4c33
-
SHA1
43d8501440f8df5e5429090f9af6335c6b32c292
-
SHA256
03122f0024975ef8688129a291f7a5398a8ef02cf65f452daf3bfb2edbb3ae80
-
SHA512
e6ddc3e452e37f6b69d7066ff8f1b3e4e6eb93f53e64398ef01993fa2d412497189af8f9e085e7c3f58ddc894589bb507ab7909474ebb19447b3d59c6cc02743
-
SSDEEP
12288:gqaDADB/q7EhGteOdlClsYKWa52SyhvvzhJrOIpPjYeiMSs3p+:gvQ/vQenTW5YvLTCIpHiiE
Malware Config
Extracted
xloader
2.3
di4p
thegeeksbeanie.net
ertugrulefendi.com
avwastemanagement.com
themindfulayurveda.com
jackietalk.com
medicineshome.com
infiniteactuaries.com
brightergreens.com
titchlondon.com
kisuke-jinbocho.com
bloggerpremiumtemplates.com
fixxatag.com
windinder.com
xn--gs-prcision-fbb.com
touteslesmaisons.com
dispute72-paypal.com
redchairsewingroom.com
comparisontech.net
fazedrop.com
tradein-car.com
indiacitydiscovery.com
biznoyes.com
qupao.xyz
mocha111.com
ownate.ltd
lacteoscampopardo.com
heidishaircuts.com
hausbysarah.com
blogthatanswer.com
salvemosalsuroeste.com
reeltalkvoices.com
parinmoboutique.com
rockidc.com
toilangumieu.com
mimik33.com
two-littlebirds.com
risk.legal
bigboyspooltoys.com
azurevsgoogle.cloud
lovinghchearts.com
spaceshiptshirts.com
dtxetgf.com
osa17.com
femtrail.com
xcc29.com
stonecarvingrocks.com
herebad.com
burntmesa.com
skycima.com
actionautomotivegroup.com
michelleskim.com
6mmachining.com
mo4tec.xyz
femuewecedre.com
zampter.com
eurowhistle.com
themclooneymercantile.com
mycascom.com
emergingcapital.group
cnnode.net
polo-kerman.com
empresadeseguridadisc.com
polaron.space
svoymed.com
abergele.wales
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5032-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exedescription pid Process procid_target PID 2588 set thread context of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe 106 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exepid Process 5032 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe 5032 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exedescription pid Process procid_target PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe 106 PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe 106 PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe 106 PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe 106 PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe 106 PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-