Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe
-
Size
535KB
-
MD5
81fc1fc53243dca652b462d903eeba40
-
SHA1
342e2fcbb9f3eba8dcffea5631ee8b1925884f80
-
SHA256
f6b04e5510e9aea04907077edff587db5c4140c90179da4449c75aee787f0c73
-
SHA512
ddf4968a3448ea50be115d9b30b7a7e4916438e0eefc985dca86f3013a1ef86a54f8efdcc3a28852be08662d13b404764a92ef0e86f001affa7ebe782fd8d8f1
-
SSDEEP
12288:P2ACbYQjoiuM3JRI2QzP6+vvea2AZnre30:tCbYQjoBM3JRI1P6+vWadtrP
Malware Config
Extracted
xloader
2.3
h3qo
dhflow.com
jyindex.com
ezcleanhandle.com
trungtamcongdong.online
simsprotectionagency.com
easylivemeet.com
blackvikingfashionhouse.com
52banxue.com
girlsinit.com
drhemo.com
freethefarmers.com
velvetrosephotography.com
geometricbotaniclas.com
skyandspirit.com
deltacomunicacao.com
mucademy.com
jaboilfieldsolutions.net
howtowinatblackjacknow.com
anytimegrowth.com
simranluthra.com
thefinleyshow.com
basalmeals.com
esurpluss.com
hrbjczsfs.com
tourphuquocnguyenhien.com
mxprographics.com
themetaphysicalmaster.net
directorystar.asia
thehomeofdiamonds.com
riqinxin.com
covicio.com
sciineurope.com
womensportclothes.com
celestialchimes.net
lotsmen.com
hi-rescloud.net
lewisnathaniel.com
ageonward.com
eyetownglasses.com
bingent.info
matildealvaradovera.com
otorrinonews.com
cdeg898.com
lexingtoncoorgresort.com
minidachshundpups.com
tools365-shop.com
romancingtheeras.com
residentmining.com
aquaflowsprinklers.com
crackapks.com
caffeinatedeverafter.com
sureyyapasa.net
strawberryhearts.com
ptgo.net
devyshkam.com
thethrottletherapy.com
givelyrics.com
signaturepsinc.com
mersinsudunyasi.com
fivedayskitchen.com
fefebeauty.com
long0001.com
hmm40.com
claracarbon.com
elevatedenterprizes.com
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
resource yara_rule behavioral2/memory/4744-4-0x0000000004D80000-0x0000000004DDE000-memory.dmp beds_protector -
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4488-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4744 set thread context of 4488 4744 81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 4808 4744 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4488 81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe 4488 81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4744 wrote to memory of 4488 4744 81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe 86 PID 4744 wrote to memory of 4488 4744 81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe 86 PID 4744 wrote to memory of 4488 4744 81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe 86 PID 4744 wrote to memory of 4488 4744 81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe 86 PID 4744 wrote to memory of 4488 4744 81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe 86 PID 4744 wrote to memory of 4488 4744 81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 11802⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4744 -ip 47441⤵PID:3828