Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 09:41

General

  • Target

    f336298269351704e8a3f7a5f071c82d_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    f336298269351704e8a3f7a5f071c82d

  • SHA1

    ee8ba4b276bfb69be97518c994d9536eebc76e53

  • SHA256

    837d5ed2867ffbf6b718264ecc27e620ffd9d14b1a4d2255f56b04181713830f

  • SHA512

    3c0bdfc2e2df3426300e1642124b10a818dea0f62691868f48b4f7b409587060f03ede4d050b0cc1ba2883ccbdb66eb310b55f42da21bd490493edf0be9728f8

  • SSDEEP

    24576:4lUWIHraPRdOG2nGhYrntpfV7WV/Nm/y12NhmK:4RILaPnpg0qnbPyYl

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

k8b5

Decoy

sardamedicals.com

reelectkendavis4council.com

coreconsultation.com

fajarazhary.com

mybitearner.com

brightpet.info

voicewithchoice.com

bailbondscompany.xyz

7133333333.com

delights.info

gawlvegdr.icu

sdqhpm.com

we2savvyok.com

primallifeathlete.com

gdsinglecell.com

isokineticmachines.com

smartneckrelax.com

gardenvintage.com

hiphopvolume.com

medicapoint.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f336298269351704e8a3f7a5f071c82d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f336298269351704e8a3f7a5f071c82d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\f336298269351704e8a3f7a5f071c82d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f336298269351704e8a3f7a5f071c82d_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2580

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1732-6-0x0000000008310000-0x0000000008398000-memory.dmp
    Filesize

    544KB

  • memory/1732-0-0x0000000000A50000-0x0000000000B8C000-memory.dmp
    Filesize

    1.2MB

  • memory/1732-2-0x0000000004690000-0x00000000046D0000-memory.dmp
    Filesize

    256KB

  • memory/1732-3-0x0000000000650000-0x000000000066C000-memory.dmp
    Filesize

    112KB

  • memory/1732-4-0x0000000073EC0000-0x00000000745AE000-memory.dmp
    Filesize

    6.9MB

  • memory/1732-5-0x0000000004690000-0x00000000046D0000-memory.dmp
    Filesize

    256KB

  • memory/1732-1-0x0000000073EC0000-0x00000000745AE000-memory.dmp
    Filesize

    6.9MB

  • memory/1732-7-0x00000000006F0000-0x0000000000742000-memory.dmp
    Filesize

    328KB

  • memory/1732-13-0x0000000073EC0000-0x00000000745AE000-memory.dmp
    Filesize

    6.9MB

  • memory/2580-9-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2580-8-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2580-12-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2580-14-0x0000000000B90000-0x0000000000E93000-memory.dmp
    Filesize

    3.0MB

  • memory/2580-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB