Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
rsqzbmeb.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
rsqzbmeb.dll
Resource
win10v2004-20240709-en
General
-
Target
3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe
-
Size
373KB
-
MD5
3ea5f2026f29ad304deb032306e375d5
-
SHA1
50f89e2a1a07ec4f1ec8ab61f25df2b81fee32a1
-
SHA256
45fda70b08542ae52a8228a61e317973f42b477583841e384e9817d7d2dd3709
-
SHA512
b90466a01386446e34eee4c99d01cd8f352847560142a7996b58aaf5de08226b00819fc2e120e9beb9db33e8acd6d71c826d7c0c34bdf208f7682b7ce82477ff
-
SSDEEP
6144:EqjIxyyzQzgMajtKspN4AqZ6q58lkbIfnWud17VJEnXmt:xayyzQ8FjYulqZ6Jjfnd/J+XW
Malware Config
Extracted
xloader
2.3
dtra
dadaocn.com
luxecrownhair.com
defenseforcesol.com
long1021.com
jemfamilyfarm.com
artmarketingtoolkit.com
ferdew.world
imagineer.network
mbirserver.com
3blocks.world
softwarepals.com
bidduhhworks.com
boardsdog.com
ktoboflloa.com
onmerino.com
defiwd.com
araujogrouplv.net
nalgojkes.com
thekalimbachannel.space
xn--vtements-b1a.com
chinalotteryticket.com
golfnutgame.com
drcushing.computer
ecoorganicbazar.com
universalvisionfilms.com
magamexdigital.com
calafiastyle.com
ukrprint.store
nudxez.com
rascalblack.com
venturotech.com
treatstulum.com
kansas-chiefs.club
cecesclassycouture.com
18sasa.com
niagaravillageseniorliving.com
tiredofbaddates.com
mriglobalusa.com
robynsoaphouse.com
b-a-o.info
hubcityusedcars.com
dahulukala2.com
111765a.com
deliciouspanama.com
healthyshipment.com
rochellefreed.com
vistracorq.com
clovehitch.net
pgstny.com
shawahe.info
casualslots.com
isrbux.com
techstudyblog.com
mazdavalencia.com
taymalexander.com
twohomesforone.com
brokod.com
davaresoon.com
technologysolutionsprovider.net
blessingbyte.com
racevx.xyz
nanoads.net
dsonomashops.com
mahsole.com
maxhuski.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2896-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Loads dropped DLL 2 IoCs
pid Process 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2876 set thread context of 2896 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe 2896 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2896 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2896 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2896 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2896 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2896 2876 3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ea5f2026f29ad304deb032306e375d5_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c
-
Filesize
17KB
MD5897c832f3eb442e7f96c20ae05b4de70
SHA131b2460d73f6aff9a4c0c3870bc7f9249ccfcd5f
SHA256eb2571fb4662c94ccc62555f342e8ceb726dede6353e2c3991c2c23acaa8d00b
SHA512084c4cbcbb8cbcef77c134c7c664905ba0325bf03d90f8a5b8552f6e0ffa3923c98a1e3477541cfef5e325676926f8191ffaaa83e1ad44ee0701462cb2b829fc