Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe
-
Size
614KB
-
MD5
1d2ebab3ed572cc11daf9d4ff90b5e0c
-
SHA1
b3ad1752b059ed8ea2f747ef6c07035c9990aca4
-
SHA256
c05c2e532b550a79508842fe8f4ab75316c86752bebd912ac84eaed0cdb4ebf4
-
SHA512
a2c644c5a78307c7f09f6de7dfef5768063918362ae4de8d6760f63679e1f617a7a86149c0f27a43471e818f1bef0d0852df9ee85853e7417d9115dff42ea463
-
SSDEEP
12288:foNNbQ+X8+UiDLbRHahRyMgtPDwd+0J5rRUqRBEOyMn8oyx:MbQ+X8+UiDLbRHahRiP0d+0PReBKs
Malware Config
Extracted
xloader
2.5
shjn
trendlito.com
myspoiledbytchcreations.com
skinsotight.com
merakii.art
sakina.digital
qumpan.com
juxing666.com
andrewolivercounselling.com
blastaerobics.com
linevshaper.store
legendvacationrentals.com
adna17.com
ingodwetrustdaycare.com
j98066.com
noordinarybusiness.com
pacelicensedelectrician.com
istanbulmadencilik.com
roboscop.com
njhude.com
eaglelures.com
asmrfans.com
wwv-kraken-apps.com
agora.markets
factechcolombia.com
cadillacjacksbargrill.com
lakearrowheadescape.com
privatelymeeting.com
purelol.com
bailey-holzwerk.com
lawsorlando.com
zoonseo.com
petscomfortgrooming.com
blogreen.xyz
modernmpm.com
axe8.club
majesticgolftours.com
happyj.biz
2ed58fwec.xyz
moms4real.com
craftsbylarissa.com
ninetofivetheses.com
giftsetswithlove.com
artistryinahome.com
bestofdubrovnik.info
mediakal-sa.net
9158cs.xyz
sakuratyu.com
christasconezntreats.com
flex-aportelabels.com
douyinliu.com
meet-bait.com
sumikkoremon.com
jjscryptosignals.com
repsychel.com
hartfulcleaning.com
buylandintexas.net
xn--blogins-w1b.com
aksene.com
californialandscapeimages.com
watchyellow.space
altcultpromotions.com
fusiongroupgames.net
panchmitramultitrade.com
theledgrowbook.com
anamentor.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3392-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exedescription pid Process procid_target PID 1972 set thread context of 3392 1972 1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exepid Process 3392 1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe 3392 1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exedescription pid Process procid_target PID 1972 wrote to memory of 3392 1972 1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe 90 PID 1972 wrote to memory of 3392 1972 1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe 90 PID 1972 wrote to memory of 3392 1972 1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe 90 PID 1972 wrote to memory of 3392 1972 1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe 90 PID 1972 wrote to memory of 3392 1972 1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe 90 PID 1972 wrote to memory of 3392 1972 1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1d2ebab3ed572cc11daf9d4ff90b5e0c_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-