Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
boc5b.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
boc5b.dll
Resource
win10v2004-20240802-en
General
-
Target
980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe
-
Size
212KB
-
MD5
980640287e6e3c84b836138e2c584a84
-
SHA1
631219ef35e49cd89275e83a790d5d0533cf60c6
-
SHA256
5ec36ac5ba843f29bb0dc75d7d527ab9cee34a681bad704a89fd5ed12cdea337
-
SHA512
15e7a4c80677ecd7f7089bb3ac73269a48725d5173d4a48d642784c9ca72bf93767772a7b3c26f393aec68192e95db4a9af4f37b573c0cd9cf1a24c285757c7d
-
SSDEEP
3072:7AwC5wP7dePo8fCczb2FpWIX991+2ELCzl901Q7Lix/54Jfvr2xliqy839yYR1P:7x/MhyWAp1jzQQPix/54FjtqyLE
Malware Config
Extracted
xloader
2.3
ivay
b4ukid.com
missioncontrol2030.com
chriswhitefoto.com
guepard-marine.com
getlauded.com
jingdonglm.com
clintlove.com
boldstrategicmedia.com
bluebay3dwdmall.com
aishag.com
forexexpoaward.com
basslakedisposal.com
bukannyaterbuai36.com
learntrhc.com
cancunpolo.com
case-cornershop.com
tahiticomplementos.com
dashanzhf.com
wholeholistichealth.com
inass-yassin.com
citestiprb151at29.com
kazancsere.net
ittakesavillagekitchen.info
jkmibszou.icu
lindamaearmstrong.com
chaithanyaonline.com
blowdryingcontest.com
nail-junkie.com
wokinbarbecue.com
thefreemusic.net
digitaldynasti.com
unclonedstream.com
utensilgranchi.com
meszur.com
stevebucci.com
acresvisionent.com
knit1eat1.com
highendsmokeshop.com
pearyazilim.com
andcarryon.com
nailzcrafted.com
homekitchenid.com
pingds.info
connectionsitsolutions.com
tradesfortomorrow.com
roadofcherrytrees.com
roeromeccanica.com
rzpte.com
royaibanks.com
freshwaterflower.com
livr.chat
findandnews.com
cpnpproductions.com
jacknow123.com
kaywoodward.com
houseofvortex.com
goodfood.directory
bosolia.com
caragross.com
racevx.xyz
americanshieldhome.com
drexelflux.com
gxwl1688.com
hurrytrip.com
digitalneeds.tech
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2748-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 2 IoCs
Processes:
980640287e6e3c84b836138e2c584a84_JaffaCakes118.exepid Process 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
980640287e6e3c84b836138e2c584a84_JaffaCakes118.exedescription pid Process procid_target PID 2388 set thread context of 2748 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
980640287e6e3c84b836138e2c584a84_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe980640287e6e3c84b836138e2c584a84_JaffaCakes118.exepid Process 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe 2748 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
980640287e6e3c84b836138e2c584a84_JaffaCakes118.exepid Process 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
980640287e6e3c84b836138e2c584a84_JaffaCakes118.exedescription pid Process procid_target PID 2388 wrote to memory of 2748 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2748 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2748 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2748 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe 30 PID 2388 wrote to memory of 2748 2388 980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\980640287e6e3c84b836138e2c584a84_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD52833c470da7df25822392c639b711547
SHA1ce6a4c63320a9e1b7d47c8a6ce0c4599563a5afe
SHA256db50b8a0d0b765c4ef329a10e6dc4ff2164e6044371ec41e1ce53ab608c8a950
SHA512a4c12e3ac7dc7000cedeaeda7c3d57d44f7ea7568b582a46f76415a11c7a0149271a02d4c5f95bcce59aa2d0baaad084c0b621899b5fd9940aea390c89731de0
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c