Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2024 22:55
Static task
static1
Behavioral task
behavioral1
Sample
efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
efb464ece5f5aa332a60d241aa93a74f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/rzvd.dll
Resource
win7-20240221-en
General
-
Target
$PLUGINSDIR/rzvd.dll
-
Size
27KB
-
MD5
d255169c5e130e0104b01f2ceb04c885
-
SHA1
e9a0bf4c711f63829fb077b75b57a14b6bdda4bc
-
SHA256
66c07a5eb743d77deff8b16a8cbcc1be0795df5197874f23fd440fbf0cae38a8
-
SHA512
15f54c5f3de381c4b935886bd120d1e4ab609109015b6b49b842aa34b465467706ac79e0b8ad0961046e841e8e352df2a12b70653c960115e6ff92c4b282605e
-
SSDEEP
768:GoFuDrc9RGl9YRFbDkAkXa37bcM0qOuB1JzTMv:hErUGlYr0a8M0SdY
Malware Config
Extracted
xloader
2.5
ons6
946acc.net
ilkermulla.com
edificationhub.com
aptbaby.com
luisrgonzalez.com
postandpine.com
objective-object.com
storeydrive.rentals
mobile-find.com
africanbridaluk.com
zzjn12.xyz
ritechoiceinvestmentgroup.com
zitzies.xyz
trulyproofreading.com
ktndetermine.xyz
advertising.land
keywordgomuwk.xyz
niecliomusicspirit.com
lhortelecom.com
cryptochieftan.com
fumctulsa.com
librariumclub.com
tinturas-espagiricas.com
regencyimperial.com
worldremirt.com
nikurei.com
edukado.online
med2cloud.com
sasktwl.net
ancditalia.com
nagukoohatomo.xyz
febfit.com
brasbux.com
bilinili236.xyz
girlxyz.com
trm.computer
studiomuis.com
pinnap.online
ra-hanbaiten-lulusia.xyz
desso.one
devilsheartdesign.com
gestproducts.com
mount-motion.com
miltonjorge.net
xiaomiyp6.com
rurikon2.com
wwwmwrfinancial.com
mikexktolsd.com
businessim.net
algoescrow.com
bitterbaybay.com
acidulante.com
yourchancemarketing.com
accidental-blogger.com
breastcancerforumbd.com
viellacharteredland.com
wkefaromaticum.com
guardianenergy.group
gamblersprintcars.com
midiff.com
firstbymel.com
fdwqw.xyz
ngatihaukoporeihana.com
pictureballthose.top
parasitevhs.net
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral4/memory/4896-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral4/memory/4896-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral4/memory/4644-10-0x00000000003A0000-0x00000000003C9000-memory.dmp xloader behavioral4/memory/4644-12-0x00000000003A0000-0x00000000003C9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1424 set thread context of 4896 1424 rundll32.exe 86 PID 4896 set thread context of 3344 4896 rundll32.exe 56 PID 4644 set thread context of 3344 4644 control.exe 56 -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4896 rundll32.exe 4896 rundll32.exe 4896 rundll32.exe 4896 rundll32.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe 4644 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4896 rundll32.exe 4896 rundll32.exe 4896 rundll32.exe 4644 control.exe 4644 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4896 rundll32.exe Token: SeDebugPrivilege 4644 control.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1424 2364 rundll32.exe 83 PID 2364 wrote to memory of 1424 2364 rundll32.exe 83 PID 2364 wrote to memory of 1424 2364 rundll32.exe 83 PID 1424 wrote to memory of 4896 1424 rundll32.exe 86 PID 1424 wrote to memory of 4896 1424 rundll32.exe 86 PID 1424 wrote to memory of 4896 1424 rundll32.exe 86 PID 1424 wrote to memory of 4896 1424 rundll32.exe 86 PID 1424 wrote to memory of 4896 1424 rundll32.exe 86 PID 1424 wrote to memory of 4896 1424 rundll32.exe 86 PID 3344 wrote to memory of 4644 3344 Explorer.EXE 95 PID 3344 wrote to memory of 4644 3344 Explorer.EXE 95 PID 3344 wrote to memory of 4644 3344 Explorer.EXE 95 PID 4644 wrote to memory of 1712 4644 control.exe 96 PID 4644 wrote to memory of 1712 4644 control.exe 96 PID 4644 wrote to memory of 1712 4644 control.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rzvd.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rzvd.dll,#13⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rzvd.dll,#14⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1036
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:988
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:428
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2112
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2024
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1604
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3624
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵PID:1712
-
-