Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe
-
Size
429KB
-
MD5
ffc988ffa94c00b1df35c93df5656097
-
SHA1
0c5cc4c1393dfdb09d78cbf3cb6d2a639963e29a
-
SHA256
bec27130e133afdcfe5a436da5d210e96caadb8a922295caa36ac69a42d14fd9
-
SHA512
a89fb1e92a027b0fcf6e7660ac6ca11e6e14b2ad166eabd464d4895cf7d409c3798fc2737e63102213f297f42138bdc00635c8266ec133eaa5b9797a4490c1db
-
SSDEEP
12288:wUi2iN9liiu9k/5XNA57ALTCGz5Qx/TWaM:wUi1A45NA57yTCGz2x/Tw
Malware Config
Extracted
xloader
2.5
mjyv
wenyuexuan.com
tropicaldepression.info
healthylifefit.com
reemletenleafy.com
jmrrve.com
mabduh.com
esomvw.com
selfcaresereneneness.com
murdabudz.com
meinemail.online
brandqrcodes.com
live-in-pflege.com
nickrecovery.com
ziototoristorante.com
chatcure.com
corlora.com
localagentlab.com
yogo7.net
krveop.com
heianswer.xyz
idproslot.xyz
anielleharris.com
lebonaharchitects.com
chilestew.com
ventasdecasasylotes.xyz
welcome-sber.store
ahmedintisher.com
pastlinks.com
productprinting.online
babybox.media
volteraenergy.net
chinatowndeliver.com
behiscalm.com
totalselfconfidence.net
single-on-purpose.com
miyonbuilding.com
medicalmanagementinc.info
bellaalubo.com
dubaibiologicdentist.com
jspagnier-graveur.com
deskbk.com
thehauntdepot.com
5fbuy.com
calmingscience.com
luvnecklace.com
noun-bug.com
mysenarai.com
socialmediaplugin.com
livinglovinglincoln.com
vaxfreeschool.com
bjjinmei.com
p60p.com
upgradepklohb.xyz
georges-lego.com
lkkogltoyof4.xyz
fryhealty.com
peacetransformationpath.com
lightfootsteps.com
recreativemysteriousgift.com
luminoza.website
mccorklehometeam.com
car-insurance-rates-x2.info
serpasboutiquedecarnes.com
1971event.com
simpeltattofor.men
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1380-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exedescription pid process target process PID 2224 set thread context of 1380 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exeffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exepid process 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 1380 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe 1380 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exedescription pid process target process PID 2224 wrote to memory of 1952 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe PID 2224 wrote to memory of 1952 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe PID 2224 wrote to memory of 1952 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe PID 2224 wrote to memory of 1380 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe PID 2224 wrote to memory of 1380 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe PID 2224 wrote to memory of 1380 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe PID 2224 wrote to memory of 1380 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe PID 2224 wrote to memory of 1380 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe PID 2224 wrote to memory of 1380 2224 ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffc988ffa94c00b1df35c93df5656097_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1380-11-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1380-15-0x0000000000F10000-0x000000000125A000-memory.dmpFilesize
3.3MB
-
memory/1380-14-0x0000000000F10000-0x000000000125A000-memory.dmpFilesize
3.3MB
-
memory/2224-6-0x0000000005940000-0x000000000594E000-memory.dmpFilesize
56KB
-
memory/2224-4-0x00000000057E0000-0x00000000057F0000-memory.dmpFilesize
64KB
-
memory/2224-5-0x0000000005700000-0x000000000570A000-memory.dmpFilesize
40KB
-
memory/2224-1-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/2224-7-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/2224-8-0x00000000057E0000-0x00000000057F0000-memory.dmpFilesize
64KB
-
memory/2224-9-0x0000000006520000-0x00000000065BC000-memory.dmpFilesize
624KB
-
memory/2224-10-0x00000000064D0000-0x0000000006522000-memory.dmpFilesize
328KB
-
memory/2224-3-0x0000000005640000-0x00000000056D2000-memory.dmpFilesize
584KB
-
memory/2224-13-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/2224-2-0x0000000005CD0000-0x0000000006274000-memory.dmpFilesize
5.6MB
-
memory/2224-0-0x0000000000C30000-0x0000000000CA2000-memory.dmpFilesize
456KB