Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-04-2024 22:55
Static task
static1
Behavioral task
behavioral1
Sample
efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/rzvd.dll
Resource
win7-20240221-en
General
-
Target
$PLUGINSDIR/rzvd.dll
-
Size
27KB
-
MD5
d255169c5e130e0104b01f2ceb04c885
-
SHA1
e9a0bf4c711f63829fb077b75b57a14b6bdda4bc
-
SHA256
66c07a5eb743d77deff8b16a8cbcc1be0795df5197874f23fd440fbf0cae38a8
-
SHA512
15f54c5f3de381c4b935886bd120d1e4ab609109015b6b49b842aa34b465467706ac79e0b8ad0961046e841e8e352df2a12b70653c960115e6ff92c4b282605e
-
SSDEEP
768:GoFuDrc9RGl9YRFbDkAkXa37bcM0qOuB1JzTMv:hErUGlYr0a8M0SdY
Malware Config
Extracted
xloader
2.5
ons6
946acc.net
ilkermulla.com
edificationhub.com
aptbaby.com
luisrgonzalez.com
postandpine.com
objective-object.com
storeydrive.rentals
mobile-find.com
africanbridaluk.com
zzjn12.xyz
ritechoiceinvestmentgroup.com
zitzies.xyz
trulyproofreading.com
ktndetermine.xyz
advertising.land
keywordgomuwk.xyz
niecliomusicspirit.com
lhortelecom.com
cryptochieftan.com
fumctulsa.com
librariumclub.com
tinturas-espagiricas.com
regencyimperial.com
worldremirt.com
nikurei.com
edukado.online
med2cloud.com
sasktwl.net
ancditalia.com
nagukoohatomo.xyz
febfit.com
brasbux.com
bilinili236.xyz
girlxyz.com
trm.computer
studiomuis.com
pinnap.online
ra-hanbaiten-lulusia.xyz
desso.one
devilsheartdesign.com
gestproducts.com
mount-motion.com
miltonjorge.net
xiaomiyp6.com
rurikon2.com
wwwmwrfinancial.com
mikexktolsd.com
businessim.net
algoescrow.com
bitterbaybay.com
acidulante.com
yourchancemarketing.com
accidental-blogger.com
breastcancerforumbd.com
viellacharteredland.com
wkefaromaticum.com
guardianenergy.group
gamblersprintcars.com
midiff.com
firstbymel.com
fdwqw.xyz
ngatihaukoporeihana.com
pictureballthose.top
parasitevhs.net
Signatures
-
Xloader payload 5 IoCs
resource yara_rule behavioral3/memory/2968-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2968-7-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2968-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2920-18-0x0000000000080000-0x00000000000A9000-memory.dmp xloader behavioral3/memory/2920-20-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2272 set thread context of 2968 2272 rundll32.exe 29 PID 2968 set thread context of 1200 2968 rundll32.exe 21 PID 2968 set thread context of 1200 2968 rundll32.exe 21 PID 2920 set thread context of 1200 2920 chkdsk.exe 21 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 2920 chkdsk.exe 2920 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2968 rundll32.exe Token: SeDebugPrivilege 2920 chkdsk.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2272 2772 rundll32.exe 28 PID 2772 wrote to memory of 2272 2772 rundll32.exe 28 PID 2772 wrote to memory of 2272 2772 rundll32.exe 28 PID 2772 wrote to memory of 2272 2772 rundll32.exe 28 PID 2772 wrote to memory of 2272 2772 rundll32.exe 28 PID 2772 wrote to memory of 2272 2772 rundll32.exe 28 PID 2772 wrote to memory of 2272 2772 rundll32.exe 28 PID 2272 wrote to memory of 2968 2272 rundll32.exe 29 PID 2272 wrote to memory of 2968 2272 rundll32.exe 29 PID 2272 wrote to memory of 2968 2272 rundll32.exe 29 PID 2272 wrote to memory of 2968 2272 rundll32.exe 29 PID 2272 wrote to memory of 2968 2272 rundll32.exe 29 PID 2272 wrote to memory of 2968 2272 rundll32.exe 29 PID 2272 wrote to memory of 2968 2272 rundll32.exe 29 PID 2272 wrote to memory of 2968 2272 rundll32.exe 29 PID 2272 wrote to memory of 2968 2272 rundll32.exe 29 PID 2272 wrote to memory of 2968 2272 rundll32.exe 29 PID 1200 wrote to memory of 2920 1200 Explorer.EXE 30 PID 1200 wrote to memory of 2920 1200 Explorer.EXE 30 PID 1200 wrote to memory of 2920 1200 Explorer.EXE 30 PID 1200 wrote to memory of 2920 1200 Explorer.EXE 30 PID 2920 wrote to memory of 2716 2920 chkdsk.exe 31 PID 2920 wrote to memory of 2716 2920 chkdsk.exe 31 PID 2920 wrote to memory of 2716 2920 chkdsk.exe 31 PID 2920 wrote to memory of 2716 2920 chkdsk.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rzvd.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rzvd.dll,#13⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rzvd.dll,#14⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵PID:2716
-
-