Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 14:50
Static task
static1
Behavioral task
behavioral1
Sample
0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
0f3ad8b37553c60914e62e1c274e8e26
-
SHA1
7954ccb7edaa00714f3f791ba48983bdc8048037
-
SHA256
7280419b73c5bd75551013c2abe327e15f90cb0f5d4de854bfa7bef5f8f92ad6
-
SHA512
6a09faeca7bacac60a120e44715300a726a39cb4707bfd14d68cfbd1cc5877407c90a083b94471e90dc203ec6bd3ec2527a1d760b3b937c8f78e79fc14ffad75
-
SSDEEP
12288:gwumX/w2iNgSFRSCSabatHlWlF2yJyENKus3oYf2xo/mn:vw1WSDDGyJygKusZgoO
Malware Config
Extracted
xloader
2.3
nvq4
emorytxinsurance.com
bastansonatarih.com
ysainasen.com
hillbilliesunite.net
lshuinai.com
consultpapers.com
digontorekha.com
diaobi.net
moonlightclayco.com
sh-junshen.com
maksavit.site
ushasoftbd.com
vienesacarnicos.com
milkonphone.com
lifeinthelineofduty.com
blackamericanoutlaw.com
wonkrushop.com
elearnium.com
scottbruce.info
anantaonline.com
bryanncervantes.com
longgangwudishou.com
dcgsustainability.com
myyixinli.com
aablebody.com
thecoconutcasa.com
def6.net
hashtagtoscana.com
amedesignstudio.com
jennetluli.club
aqoyshop.com
commonwealthbrew.com
txjlb.com
damnittech.com
reallsdesigns.com
metrso.com
1888cashoffer.online
crochetyou.com
sparksak.com
blaxies3.com
themotleysquad.com
tjtingyu.com
stubblestudio.com
lewisburgshoes.com
yodinero.com
dronainfosoft.com
alexisandtravis.com
jetro.academy
redmondremodeling.com
packagingcannabisoklahoma.com
introdvice.com
xscpapp500.com
focusedonimages.com
fernleaflearning.com
142web.com
taylorswest.com
xoxomeapparel.com
todayonly1.info
magichairprotez.com
trustedessaysite.com
indiamate.tech
smartvredit.com
hakkeijima.xyz
ranahsains.com
cyotie.com
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2636-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2636-22-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2628-28-0x00000000000D0000-0x00000000000F8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3028 set thread context of 2636 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 33 PID 2636 set thread context of 1216 2636 RegSvcs.exe 21 PID 2628 set thread context of 1216 2628 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 2636 RegSvcs.exe 2636 RegSvcs.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2636 RegSvcs.exe 2636 RegSvcs.exe 2636 RegSvcs.exe 2628 svchost.exe 2628 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe Token: SeDebugPrivilege 2636 RegSvcs.exe Token: SeDebugPrivilege 2628 svchost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2884 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 31 PID 3028 wrote to memory of 2884 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 31 PID 3028 wrote to memory of 2884 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 31 PID 3028 wrote to memory of 2884 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 31 PID 3028 wrote to memory of 2636 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 33 PID 3028 wrote to memory of 2636 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 33 PID 3028 wrote to memory of 2636 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 33 PID 3028 wrote to memory of 2636 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 33 PID 3028 wrote to memory of 2636 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 33 PID 3028 wrote to memory of 2636 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 33 PID 3028 wrote to memory of 2636 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 33 PID 3028 wrote to memory of 2636 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 33 PID 3028 wrote to memory of 2636 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 33 PID 3028 wrote to memory of 2636 3028 0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe 33 PID 1216 wrote to memory of 2628 1216 Explorer.EXE 34 PID 1216 wrote to memory of 2628 1216 Explorer.EXE 34 PID 1216 wrote to memory of 2628 1216 Explorer.EXE 34 PID 1216 wrote to memory of 2628 1216 Explorer.EXE 34 PID 2628 wrote to memory of 2464 2628 svchost.exe 35 PID 2628 wrote to memory of 2464 2628 svchost.exe 35 PID 2628 wrote to memory of 2464 2628 svchost.exe 35 PID 2628 wrote to memory of 2464 2628 svchost.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f3ad8b37553c60914e62e1c274e8e26_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vqztEKkUch" /XML "C:\Users\Admin\AppData\Local\Temp\tmp39E5.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2464
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b9015700ce42b882bb7f1b48a3aef08a
SHA19b2734418352c7f14a792ebc419965ae021db39c
SHA256ef764a255e40b94dd56412ac13fae5b7cd29092306d9f945b7469394a8298c15
SHA512a1ad704f0f6386468130b5c11a2e32636dbf4127fdd4af51da7f5c7c9358416689c60315306d37009f00027c814c01fc4010bbdf28bf5ccaacea7111813c38dc