Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 17:00 UTC

General

  • Target

    f866a06214ff680e7d9f586a8d6a84f5_JaffaCakes118.exe

  • Size

    694KB

  • MD5

    f866a06214ff680e7d9f586a8d6a84f5

  • SHA1

    e835c54d53c216a7e4b0743bffe37fb58bf66e72

  • SHA256

    39fc8ada09fdee11dac8fbb0236624c2d5dcf2b66d8f2aa4bbcdeada6de6206b

  • SHA512

    9e207618b176e3301518eba958fa0eac1e4d434744a883bd6481ef364a67a72dd78b657d63783b0ac1524c996511b4557d6af18236a9b0ba23ce1599543675c1

  • SSDEEP

    12288:21Wl8TpUMxskWv6VfuEPECDMmZXSJpBRR3QxZ:2AGR0yUExx+Cf

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

usvr

Decoy

theblockmeatstore.com

drone-moment.com

srsfashionbd.com

kylayagerartwork.com

instagrams.tools

rosenwealth.com

indicraftsvilla.com

rswizard.com

irist.one

pubgclaimx14.com

thegeorgiahomefinder.com

unusualdog.com

kifayatikart.com

methodunit.net

bavarian-luxury.com

17391000.com

ipcsaveday.com

yael-b.com

pasionqueconecta.com

youngsvideography.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f866a06214ff680e7d9f586a8d6a84f5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f866a06214ff680e7d9f586a8d6a84f5_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\f866a06214ff680e7d9f586a8d6a84f5_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f866a06214ff680e7d9f586a8d6a84f5_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/948-0-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/948-1-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/948-3-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/1468-2-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1468-5-0x0000000000950000-0x0000000000C53000-memory.dmp

    Filesize

    3.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.