Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe
-
Size
616KB
-
MD5
a3eea48c7d0cd1c1ac13ff3bf81ce5ff
-
SHA1
d69bed5b1751958cb9bb667539a5c6422f2c1492
-
SHA256
d0834d9c3b1c362289e0905285aeb0b28490cc5eacb5752080c6553c75d4b00b
-
SHA512
3a1caf398353daea530c674061be1ecba09a4ff1e8cf8aed73527baf4e7dde3f60a788bd7794faa53a770f21dd386b0dd6aa7199d5d0c7707ea102096bf59a4c
-
SSDEEP
12288:EfkvTYBcDUiRWshAgd2ptNiNZ9c5mbjCQg2WOesJcaC:Kcjdd2m6sGQ5Wraca
Malware Config
Extracted
xloader
2.1
agwz
organicsifa.com
microlivros.com
kharestudio.com
processautomationsystem.com
359192.com
user-id06783.com
hoopletesonline.com
camrashos.com
xfgyzzm.icu
jjjllcbooking.com
ztouh.info
mynetlfis.info
honeydigi.com
claytelier.com
hbozoom.com
theleftreports.net
drmenelaou.com
ignoringracism.com
querofalardesaude.com
smithysminicharters.com
leadate.com
richjude.com
lasdeliciosasmx.com
dynamosdills.com
balconesdemercurio.com
buyiptv24.com
suhejia.com
harpoonchicken.com
kaymille.com
mxjingvv.icu
trybeagle.com
cranstonhill.com
sterlingplaceseniorliving.com
aserendipityfairytale.com
cartmedical.com
leggins-store.com
paydayloans10doqd.com
offerswap.online
buymoreofthese.com
bigjuicygoal.com
yoakemae.blue
slothzzz.com
fjuewyxhk.icu
thetexantech.com
liebaosouti.com
cphrealtyllc.com
viewpano.xyz
korean-ad.xyz
sarajdavis.com
bluehourdecisions.net
julienaltieri.com
summitcreators.com
microporebrush.com
cloudshopgr.com
replounge.com
fit-for-golf.com
umbroclub.com
grepreps.com
esrasuaklier.xyz
inacuastreaming.com
beastmodemoving.com
sunflourdelights.com
vaytiennhanhhn.com
binaxnowcovid19.com
chsepd.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4644-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4952 set thread context of 4644 4952 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe 91 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4952 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe 4952 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe 4952 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe 4644 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe 4644 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4952 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4952 wrote to memory of 4644 4952 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe 91 PID 4952 wrote to memory of 4644 4952 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe 91 PID 4952 wrote to memory of 4644 4952 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe 91 PID 4952 wrote to memory of 4644 4952 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe 91 PID 4952 wrote to memory of 4644 4952 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe 91 PID 4952 wrote to memory of 4644 4952 a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\a3eea48c7d0cd1c1ac13ff3bf81ce5ff_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-