Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe
-
Size
445KB
-
MD5
65f44440d481fe7d8559a1e4303f4070
-
SHA1
9df52bc586379e05424b4578bb2b76e31627581c
-
SHA256
9ab3bb93a6d39ab709c9b2369cde749ccbe7f3796c7c3e2fc39aa4715c3bb0fd
-
SHA512
d24f97fc52beff69bef936c469bb787e1a657dd07a05e1cf6c80ed6c1bd57f0aa63215beed2e7b41d56100655931803c4d87635a831c71c65bdd65689cadac18
-
SSDEEP
12288:yFda+FdaGCbYQjoiuM3JFyreSP3UNW8jAZnreHTAf:aCbYQjoBM3JQONW80tr
Malware Config
Extracted
xloader
2.3
ivay
b4ukid.com
missioncontrol2030.com
chriswhitefoto.com
guepard-marine.com
getlauded.com
jingdonglm.com
clintlove.com
boldstrategicmedia.com
bluebay3dwdmall.com
aishag.com
forexexpoaward.com
basslakedisposal.com
bukannyaterbuai36.com
learntrhc.com
cancunpolo.com
case-cornershop.com
tahiticomplementos.com
dashanzhf.com
wholeholistichealth.com
inass-yassin.com
citestiprb151at29.com
kazancsere.net
ittakesavillagekitchen.info
jkmibszou.icu
lindamaearmstrong.com
chaithanyaonline.com
blowdryingcontest.com
nail-junkie.com
wokinbarbecue.com
thefreemusic.net
digitaldynasti.com
unclonedstream.com
utensilgranchi.com
meszur.com
stevebucci.com
acresvisionent.com
knit1eat1.com
highendsmokeshop.com
pearyazilim.com
andcarryon.com
nailzcrafted.com
homekitchenid.com
pingds.info
connectionsitsolutions.com
tradesfortomorrow.com
roadofcherrytrees.com
roeromeccanica.com
rzpte.com
royaibanks.com
freshwaterflower.com
livr.chat
findandnews.com
cpnpproductions.com
jacknow123.com
kaywoodward.com
houseofvortex.com
goodfood.directory
bosolia.com
caragross.com
racevx.xyz
americanshieldhome.com
drexelflux.com
gxwl1688.com
hurrytrip.com
digitalneeds.tech
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
resource yara_rule behavioral1/memory/2972-3-0x0000000000E40000-0x0000000000E9E000-memory.dmp beds_protector -
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2520-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2972 set thread context of 2520 2972 65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2520 65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2520 2972 65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2520 2972 65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2520 2972 65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2520 2972 65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2520 2972 65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2520 2972 65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2520 2972 65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65f44440d481fe7d8559a1e4303f4070_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520
-