Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 22:44
Static task
static1
Behavioral task
behavioral1
Sample
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe
-
Size
672KB
-
MD5
27109f0d4d1e1d20d4a64245bc6604b4
-
SHA1
ea65d2ff984d14641ee9197ee4bbdbcaf59109e3
-
SHA256
c2276e1e74e979f62298ebfdeab3d4f2ab94ef8d589026e359d88936b9013f40
-
SHA512
8ae5a44c1dfb75aaa798b8102e9cdac3540a500926558ceb86c755804ace9b31dc75d90828d08045708c0fe1bb3f5b5c9073a9d35cc73187cc07a8ed70037d9e
-
SSDEEP
12288:IBI4thq6QbSNnW0/VKjONRh7cMF5S4AhUO4anx8GJ4+IDRfr08/d5cam:IBJQz6W0tIi7cMFkf8ax/URfrL7ca
Malware Config
Extracted
xloader
2.1
p980
iwantgoddessevelyn.com
attorneysiraq.com
stfairytale-gakuin.site
mybazaartrip.com
alexjrtransport.com
present-sense.store
bigbucks4you.com
westernwings.info
qrs4u.com
knightsbridgehouse.com
fanamfoods.com
ediblesareincredible.com
revinedbypao.com
psychsolutionsofdurham.com
xn--mykyr-kra.com
sweettreatsepiceats.com
quarnetta.com
femaletopic.com
rockstoneofblue.com
btbaidu.com
mintra-group.com
amygdaliafilm.com
specter-research.com
cafebachthao.com
ayarabin.com
netlfixhelpus.net
5918199.com
strixinvestment.com
officialbondandunion.com
photozanzibar.com
timelinesofrevelation.com
solisdq.info
lightningbike.com
masonicdating.com
chambatech.net
huceste.com
drsangeetgawhale.com
bloodtypea.net
atendoonline.com
teesshot.com
electricite-finistere.com
provoked.life
hamparanberita.tech
wissotahomeprices.com
drsachinguptaoncologist.com
poklvdsa.com
huntconsultant.com
flapsfashions.com
easysuperapp.com
zsjy987.com
convertdeserve.guru
printshost.com
theanimehat.com
alywp.com
mlifilm.com
dsoregion446.com
beyouafclothing.com
ntwttbnksonline.com
avanzacarrera.com
donewithdying.com
friendsimportandexport.com
kenko-kawaraban.com
antifo.com
advancedagedcare.com
outthecancersurvey.net
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1472-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exedescription pid Process procid_target PID 3364 set thread context of 1472 3364 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 92 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exepid Process 3364 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 3364 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 3364 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 1472 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 1472 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 3364 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exedescription pid Process procid_target PID 3364 wrote to memory of 1472 3364 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 92 PID 3364 wrote to memory of 1472 3364 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 92 PID 3364 wrote to memory of 1472 3364 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 92 PID 3364 wrote to memory of 1472 3364 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 92 PID 3364 wrote to memory of 1472 3364 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 92 PID 3364 wrote to memory of 1472 3364 27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\27109f0d4d1e1d20d4a64245bc6604b4_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3144,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=4404 /prefetch:81⤵PID:2216