Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
3032632f0a00a33817224cb306b18795_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
3032632f0a00a33817224cb306b18795_JaffaCakes118.exe
-
Size
325KB
-
MD5
3032632f0a00a33817224cb306b18795
-
SHA1
03af6f9714444e6ab41949e67d05cfdfbb0b3faa
-
SHA256
1c25b56211f31c6b5b12f3f2f108fcbe15095a815475bc1601a80222b1d4b220
-
SHA512
7196af265617655f6ed60cf51e79d9b671793bd12d17aeb024c7220075fd01e7730bacd8d07236be17537bddf460a5e33532307a6cd6c92b16067e71a7952800
-
SSDEEP
6144:PZVDcH77hl6sxVoVnwLboDKMv3/NUOdUPUV:PnIHvv5UVwLMD73/NUOdUMV
Malware Config
Extracted
xloader
2.1
bs85
needcoupon.net
studio-nock.com
gladiadorcalistenia.com
proctaur.com
motemo.com
jackedhammerfitness.com
monkeysinthesky.com
milagrotacosandcantina.com
buddyresort.com
liaocheng8.xyz
vegauitdeoven.com
henriquezelectric.net
mxzc365.com
eneeds.net
elementsbuy.com
klinaton.com
choicescapes.net
waveadmit.guru
lakehoustonrugby.com
office-by-experts.com
finehygenicholdingsusa.com
triumfitlab.com
elaken.com
rosemitchellrealty.com
viamosaico.com
2westdelaware2605.info
counterman406.com
jingbangjy.com
aceyuecan.com
puntamitamansions.com
hhs38.com
popsasaurisrex.com
homedecor-04.com
aprilmayservices.com
prediwork.com
house-tips.net
jyumaiso-onsen.com
nooraudio.com
kalkitime.com
kastonremodeling.com
designtipstricks.com
liminaldata.tech
polyx.pro
goat.finance
paper-cutter-parts.com
shootingstarselite.com
karitodetalles.com
thoinc.com
rexykid.com
theheathenunderground.com
adultjobhub.com
wealthtradingacademy.com
simply-phones.com
sdmnyl.com
blacklivesforjustice.info
iso501clearsignalinfo.xyz
finmaregister.com
soal123.com
localizadordemoviles.com
lpncd.com
realniggazonlyentertainment.com
lywkm.com
mefixingme.com
yarun.site
cashflow6.xyz
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2276-7-0x0000000000370000-0x0000000000384000-memory.dmp family_zgrat_v1 -
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2964-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exedescription pid Process procid_target PID 2276 set thread context of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exepid Process 2964 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exedescription pid Process procid_target PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-