Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 05:36
Static task
static1
Behavioral task
behavioral1
Sample
62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe
-
Size
436KB
-
MD5
62337a5348b9eab53894b51e0beaa776
-
SHA1
9cee8356846b1c904c2984aa76c3cd6a1452db1c
-
SHA256
f87a8392f0acfa3a06a7ac6c6591966833a414e7f2a54301ae03b9cd02f5b84e
-
SHA512
b84ebbf306f2a7adb37d7747f4175d9e3819e900ce53fac6709d6ab10cba60f2b356677e27343abe78a1b39e7c972dab36f8e7164e41b96ba368d6e0440f3316
-
SSDEEP
12288:HKon3x71M86NdQJrIZin7sG/quADfGjgYCuIA48mymZvW:HXnx14QYiAG/quA+jzIA480Z
Malware Config
Extracted
lokibot
http://blazinghotter.igg.biz/wp/wp-content/cgi/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1192 set thread context of 4960 1192 62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe 93 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1192 62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1192 wrote to memory of 4960 1192 62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe 93 PID 1192 wrote to memory of 4960 1192 62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe 93 PID 1192 wrote to memory of 4960 1192 62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe 93 PID 1192 wrote to memory of 4960 1192 62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe 93 PID 1192 wrote to memory of 4960 1192 62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe 93 PID 1192 wrote to memory of 4960 1192 62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe 93 PID 1192 wrote to memory of 4960 1192 62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe 93 PID 1192 wrote to memory of 4960 1192 62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe 93 PID 1192 wrote to memory of 4960 1192 62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62337a5348b9eab53894b51e0beaa776_JaffaCakes118.exe"2⤵PID:4960
-