Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe
-
Size
1006KB
-
MD5
1fd9cebb62fdfd2ee9533e35a6d14aa3
-
SHA1
d43f787cf9f8c5588f6c267d3983ca5ecf6acc88
-
SHA256
c85eab78147f680f396925b005564604d84bcff97fec4bfb27e13071e791d985
-
SHA512
cc965a63a729e0be816c646155ebf201464b6d40362c9eccdab53a3653c361c829069b354f9e38dd24ac2b89ec52c7f733b825e74d45c34ec8b5588065888088
-
SSDEEP
12288:oErs4ma/bma0cxKGU2fBCRKzPARKhpwAyxRD7U4qZ2vEVBhUSB:o3XaiC/ZCAjAcwAADTqZ2vEVBhU
Malware Config
Extracted
xloader
2.3
q4kr
realmodapk.com
hanoharuka.com
shivalikspiritualproducts.com
womenshealthclinincagra.com
racketpark.com
startuporig.com
azkachinas.com
klanblog.com
linuxradio.tools
siteoficial-liquida.com
glsbuyer.com
bestdeez.com
teens2cash.com
valleyviewconstruct.com
myfortniteskins.com
cambecare.com
csec2011.com
idookap.com
warmwallsrecords.com
smartmirror.one
alertreels.com
oiop.online
61cratoslot.com
hispanicassoclv.com
pennyforyourprep.com
fayansistanbul.com
superbartendergigs.club
herr-nourimann.com
oatkc.net
romahony.com
sportcrea.com
crystalnieblas.com
lcmet.com
nwaymyatthu-mm.com
edsufferen.club
apispotlight.com
shadowcatrecording.com
capwisefin.com
themesinsider.com
kadrisells.com
db-82.com
rentyoursubmarine.com
rin-ronshop.com
donzfamilia.com
loyalcollegeofart.com
socialize.site
shadesailstructure.com
smcenterbiz.com
zcdonghua.com
1420radiolider.com
ckenpo.com
trucksitasa.com
getthistle.com
usvisanicaragua.com
josiemaxwrites.com
dehaagennutraceuticals.com
noiaapp.com
blinbins.com
getreitive.com
turmericbar.com
manifestwealthrightnow.com
garagekuhn.com
longviewfinancialadvisor.com
hallworthcapital.com
bodymoisturizer.online
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/4936-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4936-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/940-23-0x0000000000A60000-0x0000000000A89000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3396 set thread context of 4936 3396 1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe 89 PID 4936 set thread context of 3376 4936 RegSvcs.exe 56 PID 940 set thread context of 3376 940 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 940 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 3396 1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe 4936 RegSvcs.exe 4936 RegSvcs.exe 4936 RegSvcs.exe 4936 RegSvcs.exe 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE 940 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4936 RegSvcs.exe 4936 RegSvcs.exe 4936 RegSvcs.exe 940 NETSTAT.EXE 940 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3396 1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe Token: SeDebugPrivilege 4936 RegSvcs.exe Token: SeDebugPrivilege 940 NETSTAT.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3376 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3396 wrote to memory of 4936 3396 1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe 89 PID 3396 wrote to memory of 4936 3396 1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe 89 PID 3396 wrote to memory of 4936 3396 1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe 89 PID 3396 wrote to memory of 4936 3396 1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe 89 PID 3396 wrote to memory of 4936 3396 1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe 89 PID 3396 wrote to memory of 4936 3396 1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe 89 PID 3376 wrote to memory of 940 3376 Explorer.EXE 91 PID 3376 wrote to memory of 940 3376 Explorer.EXE 91 PID 3376 wrote to memory of 940 3376 Explorer.EXE 91 PID 940 wrote to memory of 2908 940 NETSTAT.EXE 92 PID 940 wrote to memory of 2908 940 NETSTAT.EXE 92 PID 940 wrote to memory of 2908 940 NETSTAT.EXE 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1fd9cebb62fdfd2ee9533e35a6d14aa3_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:4016
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-