Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe
Resource
win10v2004-20240708-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
gdqvwne6bjt.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
gdqvwne6bjt.dll
Resource
win10v2004-20240704-en
General
-
Target
2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe
-
Size
209KB
-
MD5
2e3d2302a857eb710597c6262f3c87cf
-
SHA1
1bf6dd9bac3cf9ae73d7108a014f5ae0e43305be
-
SHA256
6a37a2a65393b805bbe4e7e4e42b642da433e9caa7436aaeb9df8ab0fc6679b9
-
SHA512
488bbaa2d9a4b35251bfe117ff07bcd9c18c83c6fa64a15deaf41bde7fcdb22f4968704845923a90b6ec23b23dfce999c84de1040a72647696b96ca69cdec976
-
SSDEEP
6144:oqjIaRo4srOUXm3HL8ojJgBI97baJSUjek6o9SEmkL2ft:l1vAOqm3YoFbwD76o9AG0
Malware Config
Extracted
xloader
2.3
ivay
b4ukid.com
missioncontrol2030.com
chriswhitefoto.com
guepard-marine.com
getlauded.com
jingdonglm.com
clintlove.com
boldstrategicmedia.com
bluebay3dwdmall.com
aishag.com
forexexpoaward.com
basslakedisposal.com
bukannyaterbuai36.com
learntrhc.com
cancunpolo.com
case-cornershop.com
tahiticomplementos.com
dashanzhf.com
wholeholistichealth.com
inass-yassin.com
citestiprb151at29.com
kazancsere.net
ittakesavillagekitchen.info
jkmibszou.icu
lindamaearmstrong.com
chaithanyaonline.com
blowdryingcontest.com
nail-junkie.com
wokinbarbecue.com
thefreemusic.net
digitaldynasti.com
unclonedstream.com
utensilgranchi.com
meszur.com
stevebucci.com
acresvisionent.com
knit1eat1.com
highendsmokeshop.com
pearyazilim.com
andcarryon.com
nailzcrafted.com
homekitchenid.com
pingds.info
connectionsitsolutions.com
tradesfortomorrow.com
roadofcherrytrees.com
roeromeccanica.com
rzpte.com
royaibanks.com
freshwaterflower.com
livr.chat
findandnews.com
cpnpproductions.com
jacknow123.com
kaywoodward.com
houseofvortex.com
goodfood.directory
bosolia.com
caragross.com
racevx.xyz
americanshieldhome.com
drexelflux.com
gxwl1688.com
hurrytrip.com
digitalneeds.tech
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2936-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 2 IoCs
Processes:
2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exepid Process 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exedescription pid Process procid_target PID 3040 set thread context of 2936 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exepid Process 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe 2936 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exepid Process 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exedescription pid Process procid_target PID 3040 wrote to memory of 2936 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe 31 PID 3040 wrote to memory of 2936 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe 31 PID 3040 wrote to memory of 2936 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe 31 PID 3040 wrote to memory of 2936 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe 31 PID 3040 wrote to memory of 2936 3040 2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e3d2302a857eb710597c6262f3c87cf_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD58ac0a9612824f494f99b434b3398b110
SHA1474570ccd65cba044d5bb3cb00d4f04b67c53026
SHA2562112c3f6c4653de2bfcb88bdb2ca510696d857de1b834c0626563396052cfa88
SHA512f9306f0a49dd7e4d5f2f4830cdbfb070ced2f7f413f7a49de3011be92655d3d5905cdbd3e3772a6768aac2ead2f52d620df72cad6f8c1e833fe92771aa56fd5f
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c