Analysis
-
max time kernel
148s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe
-
Size
734KB
-
MD5
706f2e7c6cafb3205cff3d498bb5a773
-
SHA1
4fe7c2674dbe9106d40c8ab611d5375203fb5fd2
-
SHA256
fc144e7e5c01d580e1d4ab639b16df8379fcd82ee73c88b9fa0a605f8283e174
-
SHA512
8ef8e1fb5a43e3a49428bed32336a1afe3440f16dd1971bf68c5086d1276bee0b6156a7e527fa0eebc6ca164784081771750df67817837d5c244ef6c239d73dd
-
SSDEEP
12288:whx0wWh6FKgqv1JC/GId8spXECbCsSyLQBp5oUF0HK7zNc8JCfMofvTTcFE2zI6t:x4dd8cbfzU1hFJMn8FjfEr5DDwCI1C4z
Malware Config
Extracted
xloader
2.3
nvq4
emorytxinsurance.com
bastansonatarih.com
ysainasen.com
hillbilliesunite.net
lshuinai.com
consultpapers.com
digontorekha.com
diaobi.net
moonlightclayco.com
sh-junshen.com
maksavit.site
ushasoftbd.com
vienesacarnicos.com
milkonphone.com
lifeinthelineofduty.com
blackamericanoutlaw.com
wonkrushop.com
elearnium.com
scottbruce.info
anantaonline.com
bryanncervantes.com
longgangwudishou.com
dcgsustainability.com
myyixinli.com
aablebody.com
thecoconutcasa.com
def6.net
hashtagtoscana.com
amedesignstudio.com
jennetluli.club
aqoyshop.com
commonwealthbrew.com
txjlb.com
damnittech.com
reallsdesigns.com
metrso.com
1888cashoffer.online
crochetyou.com
sparksak.com
blaxies3.com
themotleysquad.com
tjtingyu.com
stubblestudio.com
lewisburgshoes.com
yodinero.com
dronainfosoft.com
alexisandtravis.com
jetro.academy
redmondremodeling.com
packagingcannabisoklahoma.com
introdvice.com
xscpapp500.com
focusedonimages.com
fernleaflearning.com
142web.com
taylorswest.com
xoxomeapparel.com
todayonly1.info
magichairprotez.com
trustedessaysite.com
indiamate.tech
smartvredit.com
hakkeijima.xyz
ranahsains.com
cyotie.com
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2932-19-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2932-23-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/332-30-0x00000000000D0000-0x00000000000F8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2132 set thread context of 2932 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 32 PID 2932 set thread context of 1080 2932 RegSvcs.exe 18 PID 332 set thread context of 1080 332 wlanext.exe 18 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 2932 RegSvcs.exe 2932 RegSvcs.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe 332 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2932 RegSvcs.exe 2932 RegSvcs.exe 2932 RegSvcs.exe 332 wlanext.exe 332 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe Token: SeDebugPrivilege 2932 RegSvcs.exe Token: SeDebugPrivilege 332 wlanext.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2516 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2516 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2516 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2516 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2932 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2932 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2932 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2932 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2932 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2932 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2932 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2932 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2932 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2932 2132 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe 32 PID 1080 wrote to memory of 332 1080 Explorer.EXE 33 PID 1080 wrote to memory of 332 1080 Explorer.EXE 33 PID 1080 wrote to memory of 332 1080 Explorer.EXE 33 PID 1080 wrote to memory of 332 1080 Explorer.EXE 33 PID 332 wrote to memory of 2784 332 wlanext.exe 34 PID 332 wrote to memory of 2784 332 wlanext.exe 34 PID 332 wrote to memory of 2784 332 wlanext.exe 34 PID 332 wrote to memory of 2784 332 wlanext.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wdUbTbOrIw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEE45.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2516
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5258c7f48eb4bbba699ecf13551d52432
SHA19f673abd1f2c7f1b870058c19e7a21fb2e8099df
SHA256aac010e0733f9ec1ee871bd7895557e048575c39fa702626accd71e7da18f3a2
SHA51255758985afb5a5fa3d233b63a983b4b766228268ab639a9d04fbc1d58c7a94126f17d28c90019d183f9fbd21673739ca805f9066fc0f8ad1a197f03d523a2ee7