Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 16:15

General

  • Target

    f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    f1778e10ebe79d43824716896d407a07

  • SHA1

    ec03537af042f6fc51b2b6cfb87107e09f22f6a6

  • SHA256

    debf9ef658a9abcc44b0d3e2d4949a2bc5f46d85c4ce44a1ad5c93c329ed62a2

  • SHA512

    a8aaf3167a1f85bb287abb94262231bec92a8ea9817445f411a5f6c81e88eeccb749a74167dc9d8ec9aab31c19bd3926297f8586a3c5e5d89866be371f940d69

  • SSDEEP

    24576:AhOsBgo0q4wMfBmCmTOUd+L6kvXWcr539JcsjEwJQwyRVBT:AYoHMpmCm6Ud+zvXPr539Tj7mwypT

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

rqe8

Decoy

bjft.net

abrosnm3.com

badlistens.com

signal-japan.com

schaka.com

kingdompersonalbranding.com

sewmenship.com

lzproperty.com

mojoimpacthosting.com

carinsurancecoverage.care

corporatemercadona.com

mobileswash.com

forevercelebration2026.com

co-het.com

bellesherlou.com

commentsoldgolf.com

onlytwod.group

utesco.info

martstrip.com

onszdgu.icu

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1664-6-0x0000000004B40000-0x0000000004BBA000-memory.dmp
    Filesize

    488KB

  • memory/1664-0-0x00000000011A0000-0x00000000012DC000-memory.dmp
    Filesize

    1.2MB

  • memory/1664-2-0x0000000000C40000-0x0000000000C80000-memory.dmp
    Filesize

    256KB

  • memory/1664-3-0x00000000003C0000-0x00000000003D2000-memory.dmp
    Filesize

    72KB

  • memory/1664-4-0x0000000074AB0000-0x000000007519E000-memory.dmp
    Filesize

    6.9MB

  • memory/1664-5-0x0000000000C40000-0x0000000000C80000-memory.dmp
    Filesize

    256KB

  • memory/1664-1-0x0000000074AB0000-0x000000007519E000-memory.dmp
    Filesize

    6.9MB

  • memory/1664-7-0x00000000005D0000-0x0000000000604000-memory.dmp
    Filesize

    208KB

  • memory/1664-15-0x0000000074AB0000-0x000000007519E000-memory.dmp
    Filesize

    6.9MB

  • memory/2400-10-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2400-8-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2400-14-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2400-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/2400-16-0x0000000000840000-0x0000000000B43000-memory.dmp
    Filesize

    3.0MB