Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-04-2024 05:54

General

  • Target

    699589bd45b3cfbe2800dd137a56619d_JaffaCakes118.exe

  • Size

    653KB

  • MD5

    699589bd45b3cfbe2800dd137a56619d

  • SHA1

    c7a5efbb84d4c748556c38c39da5f30fddb4a1a6

  • SHA256

    0ce4e2f71989e9a0a4aef640b12237135e2be4b037f9cf533ca7925224e9daa8

  • SHA512

    8c073234aa0d08c1d6d2fd2e1f42eaa2750cb0423fde65dae8be9de525e69be656ebb7f64aebbd89aa3a9369bddb76ad6c95518828550de966c8c00b17c29680

  • SSDEEP

    12288:6vf3jRILfwanROnheVzCrZLW5xZWutzZz15SgO:kILQGz+FW5P1tzlK

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

mqi9

Decoy

spectehnika-rb.com

daleproaudio.xyz

cpw887.com

gosbs-b01.com

clarkmanagementhawaii.com

taobaoi68.xyz

hoppedchardonnay.com

extremesavings.net

newbiepanda.com

arul-jegadish.com

kellibrat.com

avto-mercury.info

percussionportal.com

colorfulworldpublishing.com

notvaccinatedjobs.com

cattavida.com

pioniersa.com

yanduy.com

mzjing.com

piedmontpines.school

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\699589bd45b3cfbe2800dd137a56619d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\699589bd45b3cfbe2800dd137a56619d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\699589bd45b3cfbe2800dd137a56619d_JaffaCakes118.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2524-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2524-16-0x0000000000C10000-0x0000000000F13000-memory.dmp

    Filesize

    3.0MB

  • memory/2524-14-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2524-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2524-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3036-3-0x0000000000880000-0x0000000000894000-memory.dmp

    Filesize

    80KB

  • memory/3036-6-0x0000000005DC0000-0x0000000005E42000-memory.dmp

    Filesize

    520KB

  • memory/3036-7-0x0000000000AC0000-0x0000000000AF0000-memory.dmp

    Filesize

    192KB

  • memory/3036-5-0x0000000000A00000-0x0000000000A40000-memory.dmp

    Filesize

    256KB

  • memory/3036-4-0x0000000074940000-0x000000007502E000-memory.dmp

    Filesize

    6.9MB

  • memory/3036-0-0x0000000000B60000-0x0000000000C0A000-memory.dmp

    Filesize

    680KB

  • memory/3036-2-0x0000000000A00000-0x0000000000A40000-memory.dmp

    Filesize

    256KB

  • memory/3036-15-0x0000000074940000-0x000000007502E000-memory.dmp

    Filesize

    6.9MB

  • memory/3036-1-0x0000000074940000-0x000000007502E000-memory.dmp

    Filesize

    6.9MB