Analysis Overview
SHA256
7a12f38cc2bd503f9667620f86315281e8319f9f2dca72aa19eb19ff6f3629a6
Threat Level: Known bad
The file 97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Xloader
Xloader payload
Loads dropped DLL
Suspicious use of SetThreadContext
Program crash
Enumerates physical storage devices
Unsigned PE
NSIS installer
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-02 21:33
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-02 21:33
Reported
2024-04-02 21:35
Platform
win10v2004-20240226-en
Max time kernel
147s
Max time network
155s
Command Line
Signatures
Xloader
Xloader payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 924 set thread context of 2352 | N/A | C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 20.231.121.79:80 | tcp | |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 99.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.179.89.13.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\nsj76A8.tmp\nrxdd.dll
| MD5 | 5a5c717c752014c115f8cd5269d09230 |
| SHA1 | 9e98b8f7fc33c2a635b7fafae816e70a991db637 |
| SHA256 | bbd19853959f6a7e000b9bd1880416753f9129294efc7b5eba835891b4034459 |
| SHA512 | 350f82e6eda8687197d911cddd6d84f734e77f63d538062c49298076db297907643f8771544000d4697d5c3f3995b488ef787a5ba132c89f6b2fba6b5be9a361 |
memory/924-8-0x0000000010000000-0x000000001000D000-memory.dmp
memory/2352-9-0x0000000000400000-0x0000000000429000-memory.dmp
memory/924-10-0x0000000010000000-0x000000001000D000-memory.dmp
memory/2352-11-0x0000000000A10000-0x0000000000D5A000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-04-02 21:33
Reported
2024-04-02 21:35
Platform
win7-20240221-en
Max time kernel
150s
Max time network
122s
Command Line
Signatures
Xloader
Xloader payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2100 set thread context of 1656 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1656 set thread context of 1240 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\Explorer.EXE |
| PID 1656 set thread context of 1240 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\Explorer.EXE |
| PID 2860 set thread context of 1240 | N/A | C:\Windows\SysWOW64\explorer.exe | C:\Windows\Explorer.EXE |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nrxdd.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nrxdd.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nrxdd.dll,#1
C:\Windows\SysWOW64\explorer.exe
"C:\Windows\SysWOW64\explorer.exe"
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\SysWOW64\rundll32.exe"
Network
Files
memory/2100-0-0x0000000010000000-0x000000001000D000-memory.dmp
memory/1656-1-0x0000000000400000-0x0000000000429000-memory.dmp
memory/2100-2-0x0000000010000000-0x000000001000D000-memory.dmp
memory/1656-3-0x00000000022D0000-0x00000000025D3000-memory.dmp
memory/1656-5-0x0000000000400000-0x0000000000429000-memory.dmp
memory/1656-6-0x00000000001A0000-0x00000000001B1000-memory.dmp
memory/1240-7-0x0000000003AF0000-0x0000000003CF0000-memory.dmp
memory/1240-8-0x0000000007280000-0x000000000740A000-memory.dmp
memory/1656-10-0x0000000000400000-0x0000000000429000-memory.dmp
memory/1656-12-0x00000000001E0000-0x00000000001F1000-memory.dmp
memory/1240-11-0x0000000007280000-0x000000000740A000-memory.dmp
memory/1240-13-0x0000000006FA0000-0x00000000070F6000-memory.dmp
memory/2860-14-0x0000000000520000-0x00000000007A1000-memory.dmp
memory/2860-15-0x0000000000520000-0x00000000007A1000-memory.dmp
memory/2860-16-0x00000000000C0000-0x00000000000E9000-memory.dmp
memory/2860-17-0x00000000023B0000-0x00000000026B3000-memory.dmp
memory/2860-18-0x00000000000C0000-0x00000000000E9000-memory.dmp
memory/2860-20-0x0000000002170000-0x0000000002200000-memory.dmp
memory/1240-22-0x0000000006FA0000-0x00000000070F6000-memory.dmp
Analysis: behavioral4
Detonation Overview
Submitted
2024-04-02 21:33
Reported
2024-04-02 21:35
Platform
win10v2004-20231215-en
Max time kernel
90s
Max time network
122s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 5088 wrote to memory of 4112 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 5088 wrote to memory of 4112 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 5088 wrote to memory of 4112 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4112 wrote to memory of 2636 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4112 wrote to memory of 2636 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4112 wrote to memory of 2636 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4112 wrote to memory of 2636 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nrxdd.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nrxdd.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nrxdd.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4112 -ip 4112
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 676
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 84.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 136.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.158.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
Files
memory/4112-0-0x0000000010000000-0x000000001000D000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-02 21:33
Reported
2024-04-02 21:35
Platform
win7-20240221-en
Max time kernel
122s
Max time network
126s
Command Line
Signatures
Xloader
Xloader payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2256 set thread context of 2680 | N/A | C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\97bc9fc82cdd0607f0bd1e83622b80ba_JaffaCakes118.exe"
Network
Files
\Users\Admin\AppData\Local\Temp\nsi3737.tmp\nrxdd.dll
| MD5 | 5a5c717c752014c115f8cd5269d09230 |
| SHA1 | 9e98b8f7fc33c2a635b7fafae816e70a991db637 |
| SHA256 | bbd19853959f6a7e000b9bd1880416753f9129294efc7b5eba835891b4034459 |
| SHA512 | 350f82e6eda8687197d911cddd6d84f734e77f63d538062c49298076db297907643f8771544000d4697d5c3f3995b488ef787a5ba132c89f6b2fba6b5be9a361 |
memory/2256-8-0x0000000010000000-0x000000001000D000-memory.dmp
memory/2680-9-0x0000000000400000-0x0000000000429000-memory.dmp
memory/2256-10-0x0000000010000000-0x000000001000D000-memory.dmp
memory/2680-13-0x0000000000770000-0x0000000000A73000-memory.dmp
memory/2680-14-0x0000000000770000-0x0000000000A73000-memory.dmp