Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 11:27

General

  • Target

    f7e4da015c11e085e6f4e48b3dc2176d_JaffaCakes118.exe

  • Size

    817KB

  • MD5

    f7e4da015c11e085e6f4e48b3dc2176d

  • SHA1

    d52c29c80fb82f4774b7624d8a1d429aae69e8f3

  • SHA256

    9c667699c6643d42dd1264b3657141bf3b23b56f47e527e33ae83030d937cb5a

  • SHA512

    e062a9fe4f8caf24ae313101702d1bcc9bdb9aea7f1464b6323f83ace65abaa2e13740ecd74b676e5334a908525a876fd091792e415f1b049551a5804d34eebc

  • SSDEEP

    12288:HSeTwrmpRw3viRidw1G3lZBpqNFevbOEykaGKNR70ZJUt2NjFr:HSwJUf8E5pKFGbOEy70LUMNjR

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

wufn

Decoy

rsautoluxe.com

theroseofsharonsalon.com

singnema.com

nathanielwhite108.com

theforumonline.com

iqpt.info

joneshondaservice.com

fafene.com

solanohomebuyerclass.com

zwq.xyz

searchlakeconroehomes.com

briative.com

frystmor.city

systemofyouth.com

sctsmney.com

tv-safetrading.com

thesweetboy.com

occulusblu.com

pawsthemomentpetphotography.com

travelstipsguide.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7e4da015c11e085e6f4e48b3dc2176d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f7e4da015c11e085e6f4e48b3dc2176d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Local\Temp\f7e4da015c11e085e6f4e48b3dc2176d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f7e4da015c11e085e6f4e48b3dc2176d_JaffaCakes118.exe"
      2⤵
        PID:2740
      • C:\Users\Admin\AppData\Local\Temp\f7e4da015c11e085e6f4e48b3dc2176d_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f7e4da015c11e085e6f4e48b3dc2176d_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2200-6-0x00000000056C0000-0x000000000575A000-memory.dmp

      Filesize

      616KB

    • memory/2200-0-0x0000000000130000-0x0000000000202000-memory.dmp

      Filesize

      840KB

    • memory/2200-2-0x0000000004DF0000-0x0000000004E30000-memory.dmp

      Filesize

      256KB

    • memory/2200-3-0x00000000002D0000-0x00000000002EA000-memory.dmp

      Filesize

      104KB

    • memory/2200-4-0x0000000073F00000-0x00000000745EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2200-5-0x0000000004DF0000-0x0000000004E30000-memory.dmp

      Filesize

      256KB

    • memory/2200-1-0x0000000073F00000-0x00000000745EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2200-7-0x0000000000580000-0x00000000005AE000-memory.dmp

      Filesize

      184KB

    • memory/2200-15-0x0000000073F00000-0x00000000745EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2636-10-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2636-8-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2636-14-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2636-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2636-16-0x00000000009C0000-0x0000000000CC3000-memory.dmp

      Filesize

      3.0MB