Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe
-
Size
429KB
-
MD5
ffc988ffa94c00b1df35c93df5656097
-
SHA1
0c5cc4c1393dfdb09d78cbf3cb6d2a639963e29a
-
SHA256
bec27130e133afdcfe5a436da5d210e96caadb8a922295caa36ac69a42d14fd9
-
SHA512
a89fb1e92a027b0fcf6e7660ac6ca11e6e14b2ad166eabd464d4895cf7d409c3798fc2737e63102213f297f42138bdc00635c8266ec133eaa5b9797a4490c1db
-
SSDEEP
12288:wUi2iN9liiu9k/5XNA57ALTCGz5Qx/TWaM:wUi1A45NA57yTCGz2x/Tw
Malware Config
Extracted
xloader
2.5
mjyv
wenyuexuan.com
tropicaldepression.info
healthylifefit.com
reemletenleafy.com
jmrrve.com
mabduh.com
esomvw.com
selfcaresereneneness.com
murdabudz.com
meinemail.online
brandqrcodes.com
live-in-pflege.com
nickrecovery.com
ziototoristorante.com
chatcure.com
corlora.com
localagentlab.com
yogo7.net
krveop.com
heianswer.xyz
idproslot.xyz
anielleharris.com
lebonaharchitects.com
chilestew.com
ventasdecasasylotes.xyz
welcome-sber.store
ahmedintisher.com
pastlinks.com
productprinting.online
babybox.media
volteraenergy.net
chinatowndeliver.com
behiscalm.com
totalselfconfidence.net
single-on-purpose.com
miyonbuilding.com
medicalmanagementinc.info
bellaalubo.com
dubaibiologicdentist.com
jspagnier-graveur.com
deskbk.com
thehauntdepot.com
5fbuy.com
calmingscience.com
luvnecklace.com
noun-bug.com
mysenarai.com
socialmediaplugin.com
livinglovinglincoln.com
vaxfreeschool.com
bjjinmei.com
p60p.com
upgradepklohb.xyz
georges-lego.com
lkkogltoyof4.xyz
fryhealty.com
peacetransformationpath.com
lightfootsteps.com
recreativemysteriousgift.com
luminoza.website
mccorklehometeam.com
car-insurance-rates-x2.info
serpasboutiquedecarnes.com
1971event.com
simpeltattofor.men
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2600-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exedescription pid Process procid_target PID 1732 set thread context of 2600 1732 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exeffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exepid Process 1732 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 1732 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 2600 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 1732 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exedescription pid Process procid_target PID 1732 wrote to memory of 2600 1732 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2600 1732 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2600 1732 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2600 1732 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2600 1732 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2600 1732 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2600 1732 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600
-