Analysis

  • max time kernel
    92s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2024 00:31

General

  • Target

    f91a66d080744b9e8b946984d6d747c4_JaffaCakes118.exe

  • Size

    960KB

  • MD5

    f91a66d080744b9e8b946984d6d747c4

  • SHA1

    886580b7e7d7f27135d2c9981770a2a59332e680

  • SHA256

    c6a1a1a68b5faac43930deeab9cd6745bde62869786e21e0681b3dc0973afa80

  • SHA512

    b559c9048de556c45f77e26d4c2f1c7785348b76ae4d5f9957e202a5c9d01e7c68a1a3958aeede45ff427ad741b01fcd15497e67898acfc5176f9ac9aa1e2238

  • SSDEEP

    12288:p1baMm92lXt74Hu+sYq46e++BJETV7MSDPlGRZz/mnk4zQIL7cQGB3gVIZlH3pmB:pBLN4rpaJye9mjs2M

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

m6b5

Decoy

ixtarbelize.com

pheamal.com

daiyncc.com

staydoubted.com

laagerlitigation.club

sukrantastansakarya.com

esupport.ltd

vetscontracting.net

themuslimlife.coach

salmanairs.com

somatictherapyservices.com

lastminuteminister.com

comunicarbuenosaires.com

kazuya.tech

insightlyservicedev.com

redevelopment38subhashnagar.com

thefutureinvestor.com

simplysu.com

lagu45.com

livingstonpistolpermit.com

Signatures

  • Detect ZGRat V1 1 IoCs
  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f91a66d080744b9e8b946984d6d747c4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f91a66d080744b9e8b946984d6d747c4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Users\Admin\AppData\Local\Temp\f91a66d080744b9e8b946984d6d747c4_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f91a66d080744b9e8b946984d6d747c4_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3536

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3536-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3536-14-0x0000000001740000-0x0000000001A8A000-memory.dmp

    Filesize

    3.3MB

  • memory/3536-13-0x0000000001740000-0x0000000001A8A000-memory.dmp

    Filesize

    3.3MB

  • memory/4424-6-0x0000000005440000-0x0000000005450000-memory.dmp

    Filesize

    64KB

  • memory/4424-4-0x0000000005120000-0x0000000005196000-memory.dmp

    Filesize

    472KB

  • memory/4424-5-0x0000000005240000-0x00000000052DC000-memory.dmp

    Filesize

    624KB

  • memory/4424-0-0x00000000006E0000-0x00000000007D6000-memory.dmp

    Filesize

    984KB

  • memory/4424-7-0x0000000005040000-0x000000000505E000-memory.dmp

    Filesize

    120KB

  • memory/4424-8-0x00000000052F0000-0x0000000005370000-memory.dmp

    Filesize

    512KB

  • memory/4424-9-0x0000000005070000-0x0000000005086000-memory.dmp

    Filesize

    88KB

  • memory/4424-3-0x0000000005080000-0x0000000005112000-memory.dmp

    Filesize

    584KB

  • memory/4424-12-0x00000000747F0000-0x0000000074FA0000-memory.dmp

    Filesize

    7.7MB

  • memory/4424-2-0x0000000005550000-0x0000000005AF4000-memory.dmp

    Filesize

    5.6MB

  • memory/4424-1-0x00000000747F0000-0x0000000074FA0000-memory.dmp

    Filesize

    7.7MB