Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-04-2024 22:54

General

  • Target

    7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe

  • Size

    252KB

  • MD5

    7ca5a6d622c55365fda10c9e9ba8ee88

  • SHA1

    e79376618b25f054dc7cfd73d9561b05a5f6e64e

  • SHA256

    89dd90006d6cd58559565a7ccebc2147780e2a3ae084b5d114b2077c2ae341d7

  • SHA512

    9be8d1c85f536bb57e06b70e1af12754817e223a1345c8db0ecee08040d94695f0a1530397e08708ebde14d0621038743e003b784c63cc9b50d6ce3487f35625

  • SSDEEP

    6144:wBlL/cR7xZGzMLX/dtAEF/fsZj18crt63UVB2eu6wLu7YPCGY6Q/:CeR7gMLAM/y18wtagAeuzLp1g

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

hr8n

Decoy

xn--z4qv1cr56dk0k.group

trend-shopping.net

redherring.agency

jeetopesekashback.xyz

myverizonbillpay.com

enjoy-developpement.com

reals-markets-34.xyz

nobadfeelings.com

libbybruce.space

noobcakes.com

silviomicalikush.xyz

taschenhimmel.guru

terradr.one

suvsangebotguenstigdeorg.com

bercatv.com

toytraderinc.com

mintnft.energy

apnagas.com

canalsidespeech.com

oporbagehi.quest

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\AppData\Local\Temp\7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\7ca5a6d622c55365fda10c9e9ba8ee88_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nst1076.tmp\ygkzme.dll

    Filesize

    33KB

    MD5

    82ef6b004a2d1441297053109ffde16c

    SHA1

    1780e9780c38e5be83008d42da2da782b5f27402

    SHA256

    5e4bf71710738a4f7f90457c76546979b65716b42125f2fe81153ed9fe2b96e1

    SHA512

    d1d7b3a038429cd0b27fbd5eb1633f6131ef68ae66f9d7dd272ca16498567b7b5e22138c5b1a91e563a617463949f3d5ab7cb7cce5a63cd1bca20f3dc5730ae2

  • memory/2088-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2088-10-0x00000000008F0000-0x0000000000BF3000-memory.dmp

    Filesize

    3.0MB