Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-10-2024 09:50
Static task
static1
Behavioral task
behavioral1
Sample
1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe
-
Size
669KB
-
MD5
1cca3910af7cdf03cfb41cdf2ef7fafe
-
SHA1
1f48ee6db9425a3ad1a1e317067337db6e3cecd4
-
SHA256
82ba148765ef811db68c3cbf69b5f46568a49c7f95005883a5d9a3edb3fd18eb
-
SHA512
7bde608c61a3907031d173f0b8127232408cb4b3d84dcd256ef079611a06a54f4160e8fd6d23fcb2a3c5e45a08836ba54d6047c8fc8a6ff4463a3db00883f647
-
SSDEEP
12288:ayW/HK7zyrm+lkitcau0M38CUdE8msPO+R0bGsmKkLYOCJ+:7wltct0j328mmSbGslkLYOC0
Malware Config
Extracted
xloader
2.3
n8ba
thefitflect.com
anytourist.com
blggz.xyz
ascope.club
obyeboss.com
braun-mathematik.online
mtsnurulislamsby.com
jwpropertiestn.com
animalds.com
cunerier.com
sillysocklife.com
shopliyonamaaghin.net
theredcymbalsco.com
lostbikeproject.com
ryggoqlmga.club
realestatetriggers.com
luvlauricephotography.com
cheesehome.cloud
5fashionfix.net
wata-6-rwem.net
ominvestment.net
rrinuwsq643do2.xyz
teamtacozzzz.com
newjerseyreosales.com
theresahovo.com
wowmovies.today
77k6tgikpbs39.net
americagoldenwheels.com
digitaladbasket.com
gcagame.com
arielatkins.net
2020coaches.com
effthisshit.com
nycabl.com
fbvanminh.com
lovebirdsgifts.com
anxietyxpill.com
recaptcha-lnc.com
aprendelspr.com
expatinsur.com
backtothesimplethings.com
pcf-it.services
wintonplaceoh.com
designermotherhood.com
naamt.com
lifestylebykendra.com
thehighstatusemporium.com
oneninelacrosse.com
mariasmoworldwide.com
kitesurf-piraten.net
atelierbond.com
mynjelderlaw.com
moucopia.com
hauhome.club
imroundtable.com
thralink.com
baoequities.com
nassy.cloud
goldenstatelabradoodles.com
revenueremedyintensive.com
dfendglobal.com
pugliaandgastronomy.com
cypios.net
trinioware.com
narrowpathwc.com
Signatures
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2916-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2916-23-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2672-28-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exeMSBuild.execmmon32.exedescription pid process target process PID 2296 set thread context of 2916 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2916 set thread context of 1196 2916 MSBuild.exe Explorer.EXE PID 2672 set thread context of 1196 2672 cmmon32.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exeschtasks.execmmon32.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exeMSBuild.execmmon32.exepid process 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe 2916 MSBuild.exe 2916 MSBuild.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe 2672 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
MSBuild.execmmon32.exepid process 2916 MSBuild.exe 2916 MSBuild.exe 2916 MSBuild.exe 2672 cmmon32.exe 2672 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exeMSBuild.execmmon32.exedescription pid process Token: SeDebugPrivilege 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe Token: SeDebugPrivilege 2916 MSBuild.exe Token: SeDebugPrivilege 2672 cmmon32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exeExplorer.EXEcmmon32.exedescription pid process target process PID 2296 wrote to memory of 2736 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe schtasks.exe PID 2296 wrote to memory of 2736 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe schtasks.exe PID 2296 wrote to memory of 2736 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe schtasks.exe PID 2296 wrote to memory of 2736 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe schtasks.exe PID 2296 wrote to memory of 2968 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2968 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2968 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2968 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2724 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2724 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2724 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2724 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2916 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2916 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2916 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2916 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2916 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2916 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 2296 wrote to memory of 2916 2296 1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe MSBuild.exe PID 1196 wrote to memory of 2672 1196 Explorer.EXE cmmon32.exe PID 1196 wrote to memory of 2672 1196 Explorer.EXE cmmon32.exe PID 1196 wrote to memory of 2672 1196 Explorer.EXE cmmon32.exe PID 1196 wrote to memory of 2672 1196 Explorer.EXE cmmon32.exe PID 2672 wrote to memory of 3048 2672 cmmon32.exe cmd.exe PID 2672 wrote to memory of 3048 2672 cmmon32.exe cmd.exe PID 2672 wrote to memory of 3048 2672 cmmon32.exe cmd.exe PID 2672 wrote to memory of 3048 2672 cmmon32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1cca3910af7cdf03cfb41cdf2ef7fafe_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VsgXZJlI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7262.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:2968
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:2724
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dc6f3b27a1aeb5c14e2dd3f3783325cb
SHA1782f6b6b5b2146276d65d71a4cf2d6bd9fd3125b
SHA256706c64c72993cf2b176538de98c24a9201b600787145bc60c89387f1032d6210
SHA5126efeac9732189ec13bab5fd48ef3ab0a926f0c93df5c02619c420648abb304dda14705e1707e475f4fb509a972a1b4be3c4c52877a1eeec9467905683a897ff0