Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe
-
Size
2.4MB
-
MD5
5a53f07640f66b7e88ac3d0b4acd5f9a
-
SHA1
f8fbe7bbf85d97e557257c9fe09414a804da4a36
-
SHA256
842898cfb97f8c01b55ea1aaf32ffffb5497e1dbe6ea309bfa715e37212bb6da
-
SHA512
c0de15838eb3f87f0846f6c132db4e7c31630092d8af1552eac89a9f10cba3fd06373e0768f7504814c9728716ceaa9623db151a0b7f41354bd23c5d32b61242
-
SSDEEP
49152:uooZ0ajbQzlq5O+l4QOnn8jeX+l8uvlhfNf5lWLPNyeL9+hw/USGy7Xk/51HwgGQ:eX0zlC6mJ98BVF/Q1a7
Malware Config
Extracted
xloader
2.3
u2km
fairhygiene.com
adminnovicepro.xyz
mysteptofreedom.com
beachstoreonline.com
outofmyfacemace.com
jjudit.com
x-box2send22.club
genuineconsultingservices.com
avreeaylwomackoneil.online
englandisrael.com
wealthwelb.com
ettransfertest.com
digitalrealestate.computer
aryamansaigoa.com
caterinebat.com
bostonm.info
n1nte.net
newvisiontravels.com
ma-apo.com
samrcaldwell.net
newyorkbarbersupplies.com
newyorkcityhemorrhoidcenter.com
theglassboxesinwhichwelive.com
azttora.com
jesusgivesyourest.com
nasedka.com
freshernetwork.com
thecannaesthetician.com
offwithourheads.com
skinfolk.company
eberhard-plastics.com
cakeco.store
programday.com
weeedispensary.com
themaskmafia.com
goodbye-junk.com
alleyesaerial.com
marjanaman.com
finczars.com
nationalstryhunger.com
allonecoaching.com
stalwart.life
fricools.website
sagaming.today
ept.xyz
lagunazulsw.com
lwcl.space
smdyw8.com
wwwefacil.com
multitela.com
aoneea.com
mmvluxe.com
robairnelson.art
kpsdvc.com
fqpsov.com
merplerps.com
kinderdv.com
timmui.net
freshairmeditationcamp.com
vimdaloo.cloud
smarterthanabillionaire.com
bydrbeth.com
noorpans.com
401ktrsretire.com
condominiokaty.com
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
resource yara_rule behavioral2/memory/4556-4-0x0000000005880000-0x0000000005AE8000-memory.dmp beds_protector -
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4716-8-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4556 set thread context of 4716 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 4640 4556 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 4716 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 4716 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4556 wrote to memory of 3372 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 87 PID 4556 wrote to memory of 3372 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 87 PID 4556 wrote to memory of 3372 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 87 PID 4556 wrote to memory of 816 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 88 PID 4556 wrote to memory of 816 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 88 PID 4556 wrote to memory of 816 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 88 PID 4556 wrote to memory of 4716 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 89 PID 4556 wrote to memory of 4716 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 89 PID 4556 wrote to memory of 4716 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 89 PID 4556 wrote to memory of 4716 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 89 PID 4556 wrote to memory of 4716 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 89 PID 4556 wrote to memory of 4716 4556 5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe"2⤵PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe"2⤵PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a53f07640f66b7e88ac3d0b4acd5f9a_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 11562⤵
- Program crash
PID:4640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4556 -ip 45561⤵PID:776