Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe
-
Size
813KB
-
MD5
3e730659320a4ed6b437558f585313ce
-
SHA1
d4daac30adcf04725cdb8477ec26241f8150c1ef
-
SHA256
b241d39387ebd04a46935432e7abb733d850aa1bbbd4ca686539821f41772e05
-
SHA512
b8e8438c18d6c4b3e7b7f1ce057d4d31c86e72fc9205f687e1eebea9dd06f43f3890d0bf1be4fac1f7d6669a123a875c9dbae3304dea36cb91d71ec8326fa02d
-
SSDEEP
12288:pBGiY6H3FuFp8K3hdHHMUT5FZ6huvYBoU//0dmVmtiK5oxEy:pA6XFur8edHHhT5YuvYBoi0dE+Foxx
Malware Config
Extracted
xloader
2.5
h5jc
sindiranhalus.xyz
ttimecracker.com
bugroster.com
mentication.com
douyinliu.com
newenglandfineproperties.com
oliverchilde.top
one-seo.xyz
alabamahealthywomen.com
bordadosads.com
raapmanagement.com
mujeresenfarmalatinoamerica.com
tiendakimera.com
testingwss.com
barbiluchia.com
avnft.store
tp-great.com
buytheeye.com
802snowboards.com
sz2bj.com
louchenip.com
charltyaccounts.com
tombelle.fr
coinhypers.com
l8azffq8bk.com
uneeqlymade.com
mojito-berlin.com
barrier-to-entry.com
aestheticclinicsturkey.com
infrahaze.com
kannakraves.com
shyezhuo.com
dedenail.com
nousecos.com
277bellbranchlane.com
duncanstesting.com
neworangeland.com
bybellaeebsbrowsandlashes.com
taipeiphotographers.com
sideralmkt.online
fairlyoddesigns.com
clearbunk.com
shuterestock.com
credit-comparison.com
ozhomefurniture.com
epicbuildings.com
planet99angka.xyz
eastmillnorthandover.com
mainsufittness.com
custom-transport.com
fantasticlenses.com
zxgac.com
memphiscuttingboards.com
xmygyy.net
ashiana-housing.com
cafri.store
sorialab14.online
abdomenpkluwk.xyz
bengchina.com
kuailegu8.com
limomichigan.com
qwe2018.com
bigredtrucking.net
adgfdsfgdsgfrhankoleji.xyz
legend-sa.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2820-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 976 set thread context of 2820 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 98 -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\.gmkasm 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\GMKAssembler.Project 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\GMKAssembler.Project\Shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe\" \"%1\"" 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\GMKAssembler.Project\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe" 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\.gmkasm\ = "GMKAssembler.Project" 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\GMKAssembler.Project\Shell\open\command 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\GMKAssembler.Project\Shell 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\GMKAssembler.Project\Shell\open 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\GMKAssembler.Project\DefaultIcon 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 2820 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 2820 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 976 wrote to memory of 3680 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 97 PID 976 wrote to memory of 3680 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 97 PID 976 wrote to memory of 3680 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 97 PID 976 wrote to memory of 2820 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 98 PID 976 wrote to memory of 2820 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 98 PID 976 wrote to memory of 2820 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 98 PID 976 wrote to memory of 2820 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 98 PID 976 wrote to memory of 2820 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 98 PID 976 wrote to memory of 2820 976 3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe"2⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e730659320a4ed6b437558f585313ce_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-