Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe
-
Size
454KB
-
MD5
8e6b004fb91c81b531eb93c36fb0544c
-
SHA1
ac34c999e62735c6c117507e0fe97dbe0ff30974
-
SHA256
36dabaa854dac855255b08b096a1fb6cee39f910dfbd2101812a0c5d33b1a983
-
SHA512
f5c68042a19510f01f67b574d4a0e225e0c7d311571298ecd374f40de2aac6aa95a94a1f32dcc980ed4f1091904747724750d2544b2184451336abbe9a62fb12
-
SSDEEP
12288:kJCnJC/EMYLysUN8d5k/PrNZIec8NlgTHYDZ0dtN:hc/EMwrd5QPRZLPlgsd
Malware Config
Extracted
xloader
2.3
mt6e
morozolga.com
selimtokdemir.com
deluxeweldingsupply.com
allannateddyrose.com
iconsneakersfr.com
vicenteconchilla.com
themediatenow.com
finishmybasemint.com
blaseskincare.com
betwho.site
madewithrealmeat.com
scratchpatchinc.com
daysad.com
kraftwater.com
prolifictrades.com
usdtmgm.com
mooneworms.com
grandspecialiste.com
mirzaassociates.com
bilaltahirofficial.com
covid19overwatch.com
thelastco.com
hansenholdings.net
byjerrywilliams.com
arabgril.com
bowedpink.com
five-minute-diary.com
shop-moonandlola.com
shareboard.net
shopstuckonyou.com
streamthechurch.com
m1stkissmanga.com
cornialera.com
mobilesolutionservice.com
praying.today
thetastybears.com
thegreenlittlebuddha.com
thegiftsofanxiety.com
unmined.win
ikescakes.com
loveandhairstudio.com
okaidoku-shop.net
mcconstruction.company
anerdychristmas.com
avmelihcelik.com
therockremodelinghome.com
moment.email
fusimachallenge.com
comriv.com
lonestarcamaro.com
thetrainertailor.com
solaytech.com
didiami.com
prcfilms.com
emergesorted.com
360marketing.guru
contex3.info
gpjlqwnd.icu
mercedesbenz-jakarta.com
360holdingsbh.com
journey-broadway.com
buyers-connection.com
sufferer-unimpressible.com
hollyspringsedfoundation.com
unicom-group.com
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
resource yara_rule behavioral1/memory/1244-2-0x0000000001EE0000-0x0000000001F44000-memory.dmp beds_protector -
Xloader payload 5 IoCs
resource yara_rule behavioral1/memory/2996-24-0x0000000000400000-0x000000000042E000-memory.dmp xloader behavioral1/memory/2996-26-0x0000000000400000-0x000000000042E000-memory.dmp xloader behavioral1/memory/2996-22-0x0000000000400000-0x000000000042E000-memory.dmp xloader behavioral1/files/0x0006000000018741-44.dat xloader behavioral1/memory/2172-49-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe Powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2660 FB_31E9.tmp.exe 2636 FB_3238.tmp.exe -
Loads dropped DLL 4 IoCs
pid Process 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1244 set thread context of 2996 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 33 PID 2636 set thread context of 1204 2636 FB_3238.tmp.exe 21 PID 2172 set thread context of 1204 2172 msiexec.exe 21 -
pid Process 480 Powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 480 Powershell.exe 2636 FB_3238.tmp.exe 2636 FB_3238.tmp.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe 2172 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2636 FB_3238.tmp.exe 2636 FB_3238.tmp.exe 2636 FB_3238.tmp.exe 2172 msiexec.exe 2172 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 480 Powershell.exe Token: SeDebugPrivilege 2636 FB_3238.tmp.exe Token: SeDebugPrivilege 2172 msiexec.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1244 wrote to memory of 480 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 31 PID 1244 wrote to memory of 480 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 31 PID 1244 wrote to memory of 480 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 31 PID 1244 wrote to memory of 480 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 31 PID 1244 wrote to memory of 2996 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 33 PID 1244 wrote to memory of 2996 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 33 PID 1244 wrote to memory of 2996 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 33 PID 1244 wrote to memory of 2996 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 33 PID 1244 wrote to memory of 2996 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 33 PID 1244 wrote to memory of 2996 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 33 PID 1244 wrote to memory of 2996 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 33 PID 1244 wrote to memory of 2996 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 33 PID 1244 wrote to memory of 2996 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 33 PID 1244 wrote to memory of 2996 1244 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 33 PID 2996 wrote to memory of 2660 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 34 PID 2996 wrote to memory of 2660 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 34 PID 2996 wrote to memory of 2660 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 34 PID 2996 wrote to memory of 2660 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 34 PID 2996 wrote to memory of 2636 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 35 PID 2996 wrote to memory of 2636 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 35 PID 2996 wrote to memory of 2636 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 35 PID 2996 wrote to memory of 2636 2996 8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe 35 PID 1204 wrote to memory of 2172 1204 Explorer.EXE 38 PID 1204 wrote to memory of 2172 1204 Explorer.EXE 38 PID 1204 wrote to memory of 2172 1204 Explorer.EXE 38 PID 1204 wrote to memory of 2172 1204 Explorer.EXE 38 PID 1204 wrote to memory of 2172 1204 Explorer.EXE 38 PID 1204 wrote to memory of 2172 1204 Explorer.EXE 38 PID 1204 wrote to memory of 2172 1204 Explorer.EXE 38 PID 2172 wrote to memory of 2592 2172 msiexec.exe 39 PID 2172 wrote to memory of 2592 2172 msiexec.exe 39 PID 2172 wrote to memory of 2592 2172 msiexec.exe 39 PID 2172 wrote to memory of 2592 2172 msiexec.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'3⤵
- Drops startup file
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:480
-
-
C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\FB_31E9.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_31E9.tmp.exe"4⤵
- Executes dropped EXE
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\FB_3238.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_3238.tmp.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2648
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2276
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\FB_3238.tmp.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD574bafb3e707c7b0c63938ac200f99c7f
SHA110c5506337845ed9bf25c73d2506f9c15ab8e608
SHA256129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689
SHA5125b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781
-
Filesize
161KB
MD59fdbb8c244d070ce68c9c2b0bf77f2e7
SHA1c8a687f5ddd27c1a2fa81326a1b02b8baf7c324b
SHA25671cc6247ea30d4a06a8882e853c57789b4aa7114f2e94fd7186822b55bb41f11
SHA51230ac36503c89867fb3343e02ded5b66a02a115cc418d25012b9b2cb448c735c8fc22f449296cc274da7b55729216d590ce84c761fff58634ac5c8efb75add431