Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-04-2024 15:42

General

  • Target

    73fe142254abec3aeaef375f0564d40a_JaffaCakes118.exe

  • Size

    254KB

  • MD5

    73fe142254abec3aeaef375f0564d40a

  • SHA1

    8529d972dd89f69eb2dc2a3ba9207e67626de9b9

  • SHA256

    19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5

  • SHA512

    848d4bc144f1f861823f08ab355184786f3832555236dffa2b5639e3ceb6c2578ff0da8c3870ba26f11f7609f0f4bbc50312db565c3a6adc6e8e3155915b328e

  • SSDEEP

    6144:wBlL/ciQDQb+FraDHtBcDelxJu1cjf8Zx/saJJrBORxOZbmkZFPd:CeltxaPR8mL8Zx3JJrhRZb

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

kqna

Decoy

achyutlifesciences.com

anthemmg.com

netkopat.com

generationgirlnaturals.com

novatel-network.com

craftstockco.com

thevishantiverse.art

elkerfly.com

haerotechs.com

candypalette.com

gregdokes.com

e-commerce.company

gratitudeland.com

companyintelcloud.com

publicyazilim.com

xc6811.com

aracsozluk.com

janesgalant.quest

fraserstephendop.com

ryan.rentals

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73fe142254abec3aeaef375f0564d40a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\73fe142254abec3aeaef375f0564d40a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\73fe142254abec3aeaef375f0564d40a_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\73fe142254abec3aeaef375f0564d40a_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsd29B0.tmp\yhjjbtf.dll

    Filesize

    33KB

    MD5

    2109a0431e1e8fbce8007bc6dbdc8d2d

    SHA1

    f85d1cfa01ca893063af01510115bc279da84c2a

    SHA256

    520857c7a5bfaeebf0f39504ae85d32b7e153774e93cb2be486f9a5d35b76d05

    SHA512

    a190901c467b65b18370aa3dbec9bb994294042fb78965b6baaf92a31fdc316912679a23f81f76a0d30f51c9c9ccbabcd58b0d420a1c6060508de1f0c0d320fb

  • memory/2032-9-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2032-13-0x00000000008A0000-0x0000000000BA3000-memory.dmp

    Filesize

    3.0MB

  • memory/2032-14-0x00000000008A0000-0x0000000000BA3000-memory.dmp

    Filesize

    3.0MB

  • memory/2164-8-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB

  • memory/2164-10-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB