Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe
-
Size
734KB
-
MD5
706f2e7c6cafb3205cff3d498bb5a773
-
SHA1
4fe7c2674dbe9106d40c8ab611d5375203fb5fd2
-
SHA256
fc144e7e5c01d580e1d4ab639b16df8379fcd82ee73c88b9fa0a605f8283e174
-
SHA512
8ef8e1fb5a43e3a49428bed32336a1afe3440f16dd1971bf68c5086d1276bee0b6156a7e527fa0eebc6ca164784081771750df67817837d5c244ef6c239d73dd
-
SSDEEP
12288:whx0wWh6FKgqv1JC/GId8spXECbCsSyLQBp5oUF0HK7zNc8JCfMofvTTcFE2zI6t:x4dd8cbfzU1hFJMn8FjfEr5DDwCI1C4z
Malware Config
Extracted
xloader
2.3
nvq4
emorytxinsurance.com
bastansonatarih.com
ysainasen.com
hillbilliesunite.net
lshuinai.com
consultpapers.com
digontorekha.com
diaobi.net
moonlightclayco.com
sh-junshen.com
maksavit.site
ushasoftbd.com
vienesacarnicos.com
milkonphone.com
lifeinthelineofduty.com
blackamericanoutlaw.com
wonkrushop.com
elearnium.com
scottbruce.info
anantaonline.com
bryanncervantes.com
longgangwudishou.com
dcgsustainability.com
myyixinli.com
aablebody.com
thecoconutcasa.com
def6.net
hashtagtoscana.com
amedesignstudio.com
jennetluli.club
aqoyshop.com
commonwealthbrew.com
txjlb.com
damnittech.com
reallsdesigns.com
metrso.com
1888cashoffer.online
crochetyou.com
sparksak.com
blaxies3.com
themotleysquad.com
tjtingyu.com
stubblestudio.com
lewisburgshoes.com
yodinero.com
dronainfosoft.com
alexisandtravis.com
jetro.academy
redmondremodeling.com
packagingcannabisoklahoma.com
introdvice.com
xscpapp500.com
focusedonimages.com
fernleaflearning.com
142web.com
taylorswest.com
xoxomeapparel.com
todayonly1.info
magichairprotez.com
trustedessaysite.com
indiamate.tech
smartvredit.com
hakkeijima.xyz
ranahsains.com
cyotie.com
Signatures
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/440-23-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/440-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3148-27-0x0000000000C40000-0x0000000000C68000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exeRegSvcs.exedescription pid process target process PID 2420 set thread context of 440 2420 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe RegSvcs.exe PID 440 set thread context of 3416 440 RegSvcs.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exeschtasks.exeraserver.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
RegSvcs.exepid process 440 RegSvcs.exe 440 RegSvcs.exe 440 RegSvcs.exe 440 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
RegSvcs.exepid process 440 RegSvcs.exe 440 RegSvcs.exe 440 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 440 RegSvcs.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3416 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exeExplorer.EXEdescription pid process target process PID 2420 wrote to memory of 4908 2420 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe schtasks.exe PID 2420 wrote to memory of 4908 2420 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe schtasks.exe PID 2420 wrote to memory of 4908 2420 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe schtasks.exe PID 2420 wrote to memory of 440 2420 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe RegSvcs.exe PID 2420 wrote to memory of 440 2420 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe RegSvcs.exe PID 2420 wrote to memory of 440 2420 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe RegSvcs.exe PID 2420 wrote to memory of 440 2420 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe RegSvcs.exe PID 2420 wrote to memory of 440 2420 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe RegSvcs.exe PID 2420 wrote to memory of 440 2420 706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe RegSvcs.exe PID 3416 wrote to memory of 3148 3416 Explorer.EXE raserver.exe PID 3416 wrote to memory of 3148 3416 Explorer.EXE raserver.exe PID 3416 wrote to memory of 3148 3416 Explorer.EXE raserver.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\706f2e7c6cafb3205cff3d498bb5a773_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wdUbTbOrIw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3CE5.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3148 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cbec5d8e4b29d7fda46b54fc1568c4ac
SHA10323cf07ebb93b7bb9db595bfc1304d950d10b7f
SHA256ad1d52923fc3125779c218040587c0b82fb7d77e2b219efec47c7fadb88e46b0
SHA51294965debdde2e74c2e7b0a4190d4ce7a3faf2eaadaf29e79cd7510314f1fdf99e933300812baeea6b1a5d03d6855202a6940967dc38c3ba51b3d5d531145027d