Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 21:20
Static task
static1
Behavioral task
behavioral1
Sample
6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe
-
Size
345KB
-
MD5
6775c1a0e4f91e53bae919a76eccd5f4
-
SHA1
1f33995e87e5a954183a1c8022475760d424995f
-
SHA256
fb45376241224bbbaa4e35e3dbc78d2161e2ec026c10ca3bc93e91710b1a8672
-
SHA512
9fc290f0a560f0fc73c77b97b4c7705db55f8e072bc25a7f08288dc32dca54b2c81f498396b16534840bd4dabf2619840a27608da13ed1891745f98697b2b34e
-
SSDEEP
6144:Hrm/WHlvBYuhz7dd/ZUhVAUqqqqqqqqqqqqqqjOJUrk8qtmavEwCfaIc+9TQnqqI:Hrm/WFvBYuhz77ZQVNqqqqqqqqqqqqqM
Malware Config
Extracted
xloader
2.3
u8d3
captainpowershow.com
natpik.com
skatergaiter.com
dianadecarlodesign.com
ironcityipa.com
artifactdynamics.com
nmgyy120.com
foivgohl.com
awaitnews.com
kombite.com
culinariarapida.com
germantoolbox.com
thejadedopal.com
humdrum.asia
l-consultoria.com
collectionspriestcardiac.com
orangecountysublease.com
getsitsold.com
hoppas-eng.com
fresnommail.com
joycesartgallery.net
lightslampschandeliers.com
theteamelite.com
zack.store
ultimatedu.com
upnorthvisiontech.com
pure-delta8.com
duckshost.com
addiedobsongolf.com
proxinergy.com
nguoigiabattu.xyz
cowgirlme.com
sarl-marie.com
medicalsupplydoctor.com
lifestylecampersamerica.com
bnvjufj.icu
manhwa-manga29.bid
pelotoncolsubsidio.com
propiamente.com
visitmatogrossodosul.com
salesbaliacademy.com
horsesncourage.com
slabvacuumsuction.com
realtydiscount.net
shechihuo.com
pfgoo.com
forest-srl.com
empowermentequation.com
sistemasites.com
videosproibidos.com
forextrainingtools.com
planyourlifegirlbox.com
surez.store
neumaplus.com
bulukx.com
oscarsproperties.com
newdepthslifecoaching.com
proetics.com
vivalavie.xyz
wii2review21.club
hxc59.com
shopbundleof.com
c5hs6y01wp.com
waxtowick.com
playerucas.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4308-3-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exedescription pid process target process PID 1464 set thread context of 4308 1464 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1004 1464 WerFault.exe 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exepid process 4308 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe 4308 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exepid process 1464 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exedescription pid process target process PID 1464 wrote to memory of 4308 1464 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe PID 1464 wrote to memory of 4308 1464 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe PID 1464 wrote to memory of 4308 1464 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe PID 1464 wrote to memory of 4308 1464 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe 6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6775c1a0e4f91e53bae919a76eccd5f4_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 3402⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1464 -ip 14641⤵PID:5040