Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe
-
Size
935KB
-
MD5
fe93fd7b777639146c4927a698ab4c33
-
SHA1
43d8501440f8df5e5429090f9af6335c6b32c292
-
SHA256
03122f0024975ef8688129a291f7a5398a8ef02cf65f452daf3bfb2edbb3ae80
-
SHA512
e6ddc3e452e37f6b69d7066ff8f1b3e4e6eb93f53e64398ef01993fa2d412497189af8f9e085e7c3f58ddc894589bb507ab7909474ebb19447b3d59c6cc02743
-
SSDEEP
12288:gqaDADB/q7EhGteOdlClsYKWa52SyhvvzhJrOIpPjYeiMSs3p+:gvQ/vQenTW5YvLTCIpHiiE
Malware Config
Extracted
xloader
2.3
di4p
thegeeksbeanie.net
ertugrulefendi.com
avwastemanagement.com
themindfulayurveda.com
jackietalk.com
medicineshome.com
infiniteactuaries.com
brightergreens.com
titchlondon.com
kisuke-jinbocho.com
bloggerpremiumtemplates.com
fixxatag.com
windinder.com
xn--gs-prcision-fbb.com
touteslesmaisons.com
dispute72-paypal.com
redchairsewingroom.com
comparisontech.net
fazedrop.com
tradein-car.com
indiacitydiscovery.com
biznoyes.com
qupao.xyz
mocha111.com
ownate.ltd
lacteoscampopardo.com
heidishaircuts.com
hausbysarah.com
blogthatanswer.com
salvemosalsuroeste.com
reeltalkvoices.com
parinmoboutique.com
rockidc.com
toilangumieu.com
mimik33.com
two-littlebirds.com
risk.legal
bigboyspooltoys.com
azurevsgoogle.cloud
lovinghchearts.com
spaceshiptshirts.com
dtxetgf.com
osa17.com
femtrail.com
xcc29.com
stonecarvingrocks.com
herebad.com
burntmesa.com
skycima.com
actionautomotivegroup.com
michelleskim.com
6mmachining.com
mo4tec.xyz
femuewecedre.com
zampter.com
eurowhistle.com
themclooneymercantile.com
mycascom.com
emergingcapital.group
cnnode.net
polo-kerman.com
empresadeseguridadisc.com
polaron.space
svoymed.com
abergele.wales
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5032-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exedescription pid process target process PID 2588 set thread context of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exepid process 5032 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe 5032 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exedescription pid process target process PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe PID 2588 wrote to memory of 5032 2588 fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe93fd7b777639146c4927a698ab4c33_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2588-8-0x00000000746C0000-0x0000000074E70000-memory.dmpFilesize
7.7MB
-
memory/2588-6-0x0000000005180000-0x000000000519C000-memory.dmpFilesize
112KB
-
memory/2588-2-0x00000000054A0000-0x0000000005A44000-memory.dmpFilesize
5.6MB
-
memory/2588-3-0x0000000004E40000-0x0000000004ED2000-memory.dmpFilesize
584KB
-
memory/2588-1-0x00000000746C0000-0x0000000074E70000-memory.dmpFilesize
7.7MB
-
memory/2588-5-0x0000000004DF0000-0x0000000004DFA000-memory.dmpFilesize
40KB
-
memory/2588-0-0x0000000000490000-0x0000000000580000-memory.dmpFilesize
960KB
-
memory/2588-7-0x00000000060F0000-0x000000000618C000-memory.dmpFilesize
624KB
-
memory/2588-4-0x0000000005010000-0x0000000005020000-memory.dmpFilesize
64KB
-
memory/2588-9-0x0000000005010000-0x0000000005020000-memory.dmpFilesize
64KB
-
memory/2588-10-0x00000000068A0000-0x0000000006940000-memory.dmpFilesize
640KB
-
memory/2588-11-0x0000000008ED0000-0x0000000008F3E000-memory.dmpFilesize
440KB
-
memory/2588-14-0x00000000746C0000-0x0000000074E70000-memory.dmpFilesize
7.7MB
-
memory/5032-12-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/5032-15-0x00000000012F0000-0x000000000163A000-memory.dmpFilesize
3.3MB
-
memory/5032-16-0x00000000012F0000-0x000000000163A000-memory.dmpFilesize
3.3MB