Analysis

  • max time kernel
    93s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-04-2024 16:15

General

  • Target

    f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    f1778e10ebe79d43824716896d407a07

  • SHA1

    ec03537af042f6fc51b2b6cfb87107e09f22f6a6

  • SHA256

    debf9ef658a9abcc44b0d3e2d4949a2bc5f46d85c4ce44a1ad5c93c329ed62a2

  • SHA512

    a8aaf3167a1f85bb287abb94262231bec92a8ea9817445f411a5f6c81e88eeccb749a74167dc9d8ec9aab31c19bd3926297f8586a3c5e5d89866be371f940d69

  • SSDEEP

    24576:AhOsBgo0q4wMfBmCmTOUd+L6kvXWcr539JcsjEwJQwyRVBT:AYoHMpmCm6Ud+zvXPr539Tj7mwypT

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

rqe8

Decoy

bjft.net

abrosnm3.com

badlistens.com

signal-japan.com

schaka.com

kingdompersonalbranding.com

sewmenship.com

lzproperty.com

mojoimpacthosting.com

carinsurancecoverage.care

corporatemercadona.com

mobileswash.com

forevercelebration2026.com

co-het.com

bellesherlou.com

commentsoldgolf.com

onlytwod.group

utesco.info

martstrip.com

onszdgu.icu

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f1778e10ebe79d43824716896d407a07_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1172-8-0x0000000005140000-0x0000000005152000-memory.dmp
    Filesize

    72KB

  • memory/1172-4-0x0000000004F90000-0x0000000005022000-memory.dmp
    Filesize

    584KB

  • memory/1172-0-0x00000000003E0000-0x000000000051C000-memory.dmp
    Filesize

    1.2MB

  • memory/1172-3-0x0000000005540000-0x0000000005AE4000-memory.dmp
    Filesize

    5.6MB

  • memory/1172-9-0x0000000074480000-0x0000000074C30000-memory.dmp
    Filesize

    7.7MB

  • memory/1172-5-0x00000000051F0000-0x0000000005200000-memory.dmp
    Filesize

    64KB

  • memory/1172-6-0x0000000004ED0000-0x0000000004EDA000-memory.dmp
    Filesize

    40KB

  • memory/1172-10-0x00000000051F0000-0x0000000005200000-memory.dmp
    Filesize

    64KB

  • memory/1172-2-0x0000000074480000-0x0000000074C30000-memory.dmp
    Filesize

    7.7MB

  • memory/1172-1-0x0000000004EF0000-0x0000000004F8C000-memory.dmp
    Filesize

    624KB

  • memory/1172-7-0x0000000005180000-0x00000000051D6000-memory.dmp
    Filesize

    344KB

  • memory/1172-11-0x00000000069B0000-0x0000000006A2A000-memory.dmp
    Filesize

    488KB

  • memory/1172-12-0x0000000005E60000-0x0000000005E94000-memory.dmp
    Filesize

    208KB

  • memory/1172-15-0x0000000074480000-0x0000000074C30000-memory.dmp
    Filesize

    7.7MB

  • memory/4468-13-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/4468-16-0x00000000017A0000-0x0000000001AEA000-memory.dmp
    Filesize

    3.3MB

  • memory/4468-17-0x00000000017A0000-0x0000000001AEA000-memory.dmp
    Filesize

    3.3MB