Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
3032632f0a00a33817224cb306b18795_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
3032632f0a00a33817224cb306b18795_JaffaCakes118.exe
-
Size
325KB
-
MD5
3032632f0a00a33817224cb306b18795
-
SHA1
03af6f9714444e6ab41949e67d05cfdfbb0b3faa
-
SHA256
1c25b56211f31c6b5b12f3f2f108fcbe15095a815475bc1601a80222b1d4b220
-
SHA512
7196af265617655f6ed60cf51e79d9b671793bd12d17aeb024c7220075fd01e7730bacd8d07236be17537bddf460a5e33532307a6cd6c92b16067e71a7952800
-
SSDEEP
6144:PZVDcH77hl6sxVoVnwLboDKMv3/NUOdUPUV:PnIHvv5UVwLMD73/NUOdUMV
Malware Config
Extracted
xloader
2.1
bs85
needcoupon.net
studio-nock.com
gladiadorcalistenia.com
proctaur.com
motemo.com
jackedhammerfitness.com
monkeysinthesky.com
milagrotacosandcantina.com
buddyresort.com
liaocheng8.xyz
vegauitdeoven.com
henriquezelectric.net
mxzc365.com
eneeds.net
elementsbuy.com
klinaton.com
choicescapes.net
waveadmit.guru
lakehoustonrugby.com
office-by-experts.com
finehygenicholdingsusa.com
triumfitlab.com
elaken.com
rosemitchellrealty.com
viamosaico.com
2westdelaware2605.info
counterman406.com
jingbangjy.com
aceyuecan.com
puntamitamansions.com
hhs38.com
popsasaurisrex.com
homedecor-04.com
aprilmayservices.com
prediwork.com
house-tips.net
jyumaiso-onsen.com
nooraudio.com
kalkitime.com
kastonremodeling.com
designtipstricks.com
liminaldata.tech
polyx.pro
goat.finance
paper-cutter-parts.com
shootingstarselite.com
karitodetalles.com
thoinc.com
rexykid.com
theheathenunderground.com
adultjobhub.com
wealthtradingacademy.com
simply-phones.com
sdmnyl.com
blacklivesforjustice.info
iso501clearsignalinfo.xyz
finmaregister.com
soal123.com
localizadordemoviles.com
lpncd.com
realniggazonlyentertainment.com
lywkm.com
mefixingme.com
yarun.site
cashflow6.xyz
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2276-7-0x0000000000370000-0x0000000000384000-memory.dmp family_zgrat_v1 -
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2964-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exedescription pid process target process PID 2276 set thread context of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exepid process 2964 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
3032632f0a00a33817224cb306b18795_JaffaCakes118.exedescription pid process target process PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe PID 2276 wrote to memory of 2964 2276 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe 3032632f0a00a33817224cb306b18795_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3032632f0a00a33817224cb306b18795_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2276-6-0x0000000000BF0000-0x0000000000C28000-memory.dmpFilesize
224KB
-
memory/2276-0-0x000000007443E000-0x000000007443F000-memory.dmpFilesize
4KB
-
memory/2276-2-0x0000000000240000-0x0000000000246000-memory.dmpFilesize
24KB
-
memory/2276-3-0x0000000074430000-0x0000000074B1E000-memory.dmpFilesize
6.9MB
-
memory/2276-4-0x000000007443E000-0x000000007443F000-memory.dmpFilesize
4KB
-
memory/2276-5-0x0000000074430000-0x0000000074B1E000-memory.dmpFilesize
6.9MB
-
memory/2276-1-0x0000000001070000-0x00000000010C6000-memory.dmpFilesize
344KB
-
memory/2276-7-0x0000000000370000-0x0000000000384000-memory.dmpFilesize
80KB
-
memory/2276-15-0x0000000074430000-0x0000000074B1E000-memory.dmpFilesize
6.9MB
-
memory/2964-14-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2964-9-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2964-10-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2964-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2964-16-0x0000000000970000-0x0000000000C73000-memory.dmpFilesize
3.0MB