Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 18:13
Static task
static1
Behavioral task
behavioral1
Sample
9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe
-
Size
425KB
-
MD5
9f1a5e5c6a5c5493459010d43af8f504
-
SHA1
56ed32addbac6dd6f1fe2ddfb4add70c04a1596d
-
SHA256
652ed909a2087f6e3eeec91c002f66d4f9256e809439d2e081031e0776803e6c
-
SHA512
5a2b2077abb729fd4f186a81e6941b04dc59c7b1a4173ffd1db8aea4c9d9e7a628958ff577bc46b85cba3ca597642c766c85f83670bc1fc5345616930baa3fe1
-
SSDEEP
12288:wHFZ2iNHv2zv1gt1jnqgS7+QkNdlVR81TasQw8Mgy:41c2tpnc7Md/R893V8Mgy
Malware Config
Extracted
xloader
2.1
pzba
cafeblanca.net
goodvibrationswindchimes.com
mydmapp.com
isabelpasadaspsicologa.com
adonustmuseum.com
oghomeinfoa18.club
asia-ivoyage.com
chargegamehair.com
78500802.xyz
siteoficialcliqueagora.com
kanchanspice.com
elysalesgh.com
zbarrier.com
mariedietze.fyi
ppope.com
bluechipsgroup.company
mineola.education
covkpbac.icu
bettercityhomes.com
elevenlevels.com
highway41shops.com
causalco.com
ouraqto.com
paste.email
ikaptbx9yl.com
talleresjuvica.com
autowarrantypro.net
tjv.wtf
scoriabarnks.com
hanoinews.site
grandpainsurance.com
hausajoint.com
houstonqualitywindows.com
fanhongxuan.com
jacquelinedeconinck.com
ourliao.com
itaaec2020.com
redantply.com
naijamp3king.com
chinawhhc.com
altenpflege.jobs
livesupgrade.com
mominhts.com
buytheamericandream.com
fuddlet.com
wegoo.store
definitiveonline.com
dianekochias.com
robintopia.com
peacetiger.net
idealmotivator.com
carry380.com
hd-sr.com
bestgiftforu.com
rebuildingtransmission.com
finessa-holland.com
nationscuprugby.com
mifaclothing.com
362hume.com
ntkne.com
gaturrive1990.com
tapdoanbatdongsan.net
nationallandingexchange.com
doumin168.com
qrudjay.info
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2868-16-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exedescription pid Process procid_target PID 2240 set thread context of 2868 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exepid Process 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 2868 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exedescription pid Process procid_target PID 2240 wrote to memory of 2532 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2532 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2532 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2532 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2868 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2868 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2868 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2868 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2868 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2868 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2868 2240 9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe"2⤵PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f1a5e5c6a5c5493459010d43af8f504_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-