Analysis
-
max time kernel
126s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
3032632f0a00a33817224cb306b18795_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
3032632f0a00a33817224cb306b18795_JaffaCakes118.exe
-
Size
325KB
-
MD5
3032632f0a00a33817224cb306b18795
-
SHA1
03af6f9714444e6ab41949e67d05cfdfbb0b3faa
-
SHA256
1c25b56211f31c6b5b12f3f2f108fcbe15095a815475bc1601a80222b1d4b220
-
SHA512
7196af265617655f6ed60cf51e79d9b671793bd12d17aeb024c7220075fd01e7730bacd8d07236be17537bddf460a5e33532307a6cd6c92b16067e71a7952800
-
SSDEEP
6144:PZVDcH77hl6sxVoVnwLboDKMv3/NUOdUPUV:PnIHvv5UVwLMD73/NUOdUMV
Malware Config
Extracted
xloader
2.1
bs85
needcoupon.net
studio-nock.com
gladiadorcalistenia.com
proctaur.com
motemo.com
jackedhammerfitness.com
monkeysinthesky.com
milagrotacosandcantina.com
buddyresort.com
liaocheng8.xyz
vegauitdeoven.com
henriquezelectric.net
mxzc365.com
eneeds.net
elementsbuy.com
klinaton.com
choicescapes.net
waveadmit.guru
lakehoustonrugby.com
office-by-experts.com
finehygenicholdingsusa.com
triumfitlab.com
elaken.com
rosemitchellrealty.com
viamosaico.com
2westdelaware2605.info
counterman406.com
jingbangjy.com
aceyuecan.com
puntamitamansions.com
hhs38.com
popsasaurisrex.com
homedecor-04.com
aprilmayservices.com
prediwork.com
house-tips.net
jyumaiso-onsen.com
nooraudio.com
kalkitime.com
kastonremodeling.com
designtipstricks.com
liminaldata.tech
polyx.pro
goat.finance
paper-cutter-parts.com
shootingstarselite.com
karitodetalles.com
thoinc.com
rexykid.com
theheathenunderground.com
adultjobhub.com
wealthtradingacademy.com
simply-phones.com
sdmnyl.com
blacklivesforjustice.info
iso501clearsignalinfo.xyz
finmaregister.com
soal123.com
localizadordemoviles.com
lpncd.com
realniggazonlyentertainment.com
lywkm.com
mefixingme.com
yarun.site
cashflow6.xyz
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3968-9-0x00000000059D0000-0x00000000059E4000-memory.dmp family_zgrat_v1 -
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/860-10-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exedescription pid Process procid_target PID 3968 set thread context of 860 3968 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 99 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exepid Process 860 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 860 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 3968 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exedescription pid Process procid_target PID 3968 wrote to memory of 860 3968 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 99 PID 3968 wrote to memory of 860 3968 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 99 PID 3968 wrote to memory of 860 3968 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 99 PID 3968 wrote to memory of 860 3968 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 99 PID 3968 wrote to memory of 860 3968 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 99 PID 3968 wrote to memory of 860 3968 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4068,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=4072 /prefetch:81⤵PID:3048