Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
aiktcq2j34.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
aiktcq2j34.dll
Resource
win10v2004-20240802-en
General
-
Target
b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe
-
Size
212KB
-
MD5
b0831ddebf21044f7035841a270f8546
-
SHA1
89e654590cb02f4f6a646816314737b9dad6f560
-
SHA256
170eb254fe7cae506272dd7f934000734f55648fcefab6843eca50311a98a07d
-
SHA512
741d53d5dc4e67df8e336e747a6e5481273e77669fda3e5e4075c566ca980e2458efb2cb4bf694d2a557f79681f87642f8fd318ad2ab31161d5c00cb7ec67182
-
SSDEEP
6144:IqjIifDkCFmb6vuvZKdzDMofz/FyT2kHrtt:F1fgYmbeGZ+0of42kT
Malware Config
Extracted
xloader
2.3
09rb
chatmeapp.net
jennyandmatt2021.com
myaarpdentalpln.com
valexplorer.com
kobumsnetwork.com
kimschrierforcongress.com
yixun01.com
changxunt.com
finishingtouchfootball.com
stereoslide.com
penipay.com
iregentos.info
thebuzztraders.com
ashleyandwarner.com
idratherbeinbed.com
trysweetlife.com
emuprising.com
theconnectioncure4anewlife.com
wendyallegaert.com
88779599.com
leanbirthdaycake.com
edgehairandbeauty.com
nesilyilmaz.com
austinscubaschool.com
travelscool.site
myraklereleafcannaclinic.com
virginiadoyle.com
edessaconstructiontt.com
prendimiconcept.com
3991799.com
fallguysgen.com
legendtrailcommunity.com
torisimon.xyz
alessandrabortolussi.net
winejm.com
on3sport.com
airfast-express.com
becomeadigitalsoul.com
watereminder.com
lobstermenforgolden.com
unitedbythebucket.com
789bet168th.com
efoh27.com
psiexamz.com
rednbot.com
rappaportcos.com
gizzago.com
zoratve.com
casinogenbo.com
vinkakafitness.com
pcvczva.icu
luxiaoqiao.com
morbition.com
heavyweightsurf.com
artois-plomberie-ambar.com
justvalerian.com
ohmake.com
totallyfitwellness.com
bramfambeads.com
expandtherapy.com
rcheapsmartshop.com
maraguaverde.com
teechnie.com
aksaystudios.com
aizimov.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2644-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 2 IoCs
Processes:
b0831ddebf21044f7035841a270f8546_JaffaCakes118.exepid Process 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b0831ddebf21044f7035841a270f8546_JaffaCakes118.exedescription pid Process procid_target PID 1628 set thread context of 2644 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b0831ddebf21044f7035841a270f8546_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
b0831ddebf21044f7035841a270f8546_JaffaCakes118.exeb0831ddebf21044f7035841a270f8546_JaffaCakes118.exepid Process 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe 2644 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b0831ddebf21044f7035841a270f8546_JaffaCakes118.exepid Process 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
b0831ddebf21044f7035841a270f8546_JaffaCakes118.exedescription pid Process procid_target PID 1628 wrote to memory of 2644 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2644 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2644 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2644 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2644 1628 b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0831ddebf21044f7035841a270f8546_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5e72396b2a612239e6c940ea4ea11c7ad
SHA19e5769c57114da40e6e5299a746fbf62d81bd417
SHA256360863eda760250d6a21b0e558149b411024cf0a8da2f195b2cdc6a886c1b0c1
SHA512934e50b0c928eb0ac905e4692b7517604b3bf41fb7e62dbcb83733d5fc94d584f019fc2d47fe18d38f66e1959517318a942fb978f2612d06cedfb83c1663543b
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c