Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 22:44
Static task
static1
Behavioral task
behavioral1
Sample
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe
-
Size
672KB
-
MD5
27109f0d4d1e1d20d4a64245bc6604b4
-
SHA1
ea65d2ff984d14641ee9197ee4bbdbcaf59109e3
-
SHA256
c2276e1e74e979f62298ebfdeab3d4f2ab94ef8d589026e359d88936b9013f40
-
SHA512
8ae5a44c1dfb75aaa798b8102e9cdac3540a500926558ceb86c755804ace9b31dc75d90828d08045708c0fe1bb3f5b5c9073a9d35cc73187cc07a8ed70037d9e
-
SSDEEP
12288:IBI4thq6QbSNnW0/VKjONRh7cMF5S4AhUO4anx8GJ4+IDRfr08/d5cam:IBJQz6W0tIi7cMFkf8ax/URfrL7ca
Malware Config
Extracted
xloader
2.1
p980
iwantgoddessevelyn.com
attorneysiraq.com
stfairytale-gakuin.site
mybazaartrip.com
alexjrtransport.com
present-sense.store
bigbucks4you.com
westernwings.info
qrs4u.com
knightsbridgehouse.com
fanamfoods.com
ediblesareincredible.com
revinedbypao.com
psychsolutionsofdurham.com
xn--mykyr-kra.com
sweettreatsepiceats.com
quarnetta.com
femaletopic.com
rockstoneofblue.com
btbaidu.com
mintra-group.com
amygdaliafilm.com
specter-research.com
cafebachthao.com
ayarabin.com
netlfixhelpus.net
5918199.com
strixinvestment.com
officialbondandunion.com
photozanzibar.com
timelinesofrevelation.com
solisdq.info
lightningbike.com
masonicdating.com
chambatech.net
huceste.com
drsangeetgawhale.com
bloodtypea.net
atendoonline.com
teesshot.com
electricite-finistere.com
provoked.life
hamparanberita.tech
wissotahomeprices.com
drsachinguptaoncologist.com
poklvdsa.com
huntconsultant.com
flapsfashions.com
easysuperapp.com
zsjy987.com
convertdeserve.guru
printshost.com
theanimehat.com
alywp.com
mlifilm.com
dsoregion446.com
beyouafclothing.com
ntwttbnksonline.com
avanzacarrera.com
donewithdying.com
friendsimportandexport.com
kenko-kawaraban.com
antifo.com
advancedagedcare.com
outthecancersurvey.net
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3052-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exedescription pid process target process PID 1684 set thread context of 3052 1684 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exepid process 1684 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 1684 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 3052 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1684 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exedescription pid process target process PID 1684 wrote to memory of 3052 1684 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe PID 1684 wrote to memory of 3052 1684 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe PID 1684 wrote to memory of 3052 1684 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe PID 1684 wrote to memory of 3052 1684 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe PID 1684 wrote to memory of 3052 1684 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe PID 1684 wrote to memory of 3052 1684 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe PID 1684 wrote to memory of 3052 1684 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1684-6-0x0000000005CC0000-0x0000000005D48000-memory.dmpFilesize
544KB
-
memory/1684-0-0x0000000074D9E000-0x0000000074D9F000-memory.dmpFilesize
4KB
-
memory/1684-2-0x0000000074D90000-0x000000007547E000-memory.dmpFilesize
6.9MB
-
memory/1684-3-0x0000000000480000-0x0000000000492000-memory.dmpFilesize
72KB
-
memory/1684-4-0x0000000074D9E000-0x0000000074D9F000-memory.dmpFilesize
4KB
-
memory/1684-5-0x0000000074D90000-0x000000007547E000-memory.dmpFilesize
6.9MB
-
memory/1684-1-0x0000000000FE0000-0x000000000108E000-memory.dmpFilesize
696KB
-
memory/1684-7-0x0000000005D40000-0x0000000005DB2000-memory.dmpFilesize
456KB
-
memory/1684-15-0x0000000074D90000-0x000000007547E000-memory.dmpFilesize
6.9MB
-
memory/3052-14-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3052-9-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3052-10-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3052-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/3052-16-0x0000000000A20000-0x0000000000D23000-memory.dmpFilesize
3.0MB