Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-07-2024 13:37

General

  • Target

    579c372392d600a9ef621ae4c1f7341a_JaffaCakes118.exe

  • Size

    521KB

  • MD5

    579c372392d600a9ef621ae4c1f7341a

  • SHA1

    e4fb160d99727aa5ffee784c9a5f52f6581704ee

  • SHA256

    f564f410274ccf48d4513984d1da95edefa874a555f5e7d95fae7f9cc1f46b6b

  • SHA512

    1c744f5d9b4bb04e0ed84bc66ad6a4970e2ff18da28a4c2b9910683821c6fe43ad585e22c56fbb26e1c0db547c7e58d432ffb9c1186da81b47c7f13e7335755f

  • SSDEEP

    6144:0uq2lrmbYS9j7tCiyEKAm63z9EZgVY+RQbwesfqFi/mpZ5bjf9VAZUUryjzbi:0WCbYQjoiuM3J0CyFzxVAZnreXi

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

h3qo

Decoy

dhflow.com

jyindex.com

ezcleanhandle.com

trungtamcongdong.online

simsprotectionagency.com

easylivemeet.com

blackvikingfashionhouse.com

52banxue.com

girlsinit.com

drhemo.com

freethefarmers.com

velvetrosephotography.com

geometricbotaniclas.com

skyandspirit.com

deltacomunicacao.com

mucademy.com

jaboilfieldsolutions.net

howtowinatblackjacknow.com

anytimegrowth.com

simranluthra.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Beds Protector Packer 1 IoCs

    Detects Beds Protector packer used to load .NET malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\579c372392d600a9ef621ae4c1f7341a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\579c372392d600a9ef621ae4c1f7341a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\AppData\Local\Temp\579c372392d600a9ef621ae4c1f7341a_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\579c372392d600a9ef621ae4c1f7341a_JaffaCakes118.exe"
      2⤵
        PID:2684
      • C:\Users\Admin\AppData\Local\Temp\579c372392d600a9ef621ae4c1f7341a_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\579c372392d600a9ef621ae4c1f7341a_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:5016

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1492-0-0x0000000074F0E000-0x0000000074F0F000-memory.dmp

      Filesize

      4KB

    • memory/1492-1-0x0000000000300000-0x0000000000388000-memory.dmp

      Filesize

      544KB

    • memory/1492-2-0x0000000005210000-0x00000000057B4000-memory.dmp

      Filesize

      5.6MB

    • memory/1492-3-0x0000000004D40000-0x0000000004DD2000-memory.dmp

      Filesize

      584KB

    • memory/1492-4-0x0000000004DE0000-0x0000000004E3E000-memory.dmp

      Filesize

      376KB

    • memory/1492-5-0x0000000004EF0000-0x0000000004F8C000-memory.dmp

      Filesize

      624KB

    • memory/1492-6-0x0000000074F00000-0x00000000756B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1492-7-0x0000000004E50000-0x0000000004E66000-memory.dmp

      Filesize

      88KB

    • memory/1492-10-0x0000000074F00000-0x00000000756B0000-memory.dmp

      Filesize

      7.7MB

    • memory/5016-8-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/5016-11-0x0000000001990000-0x0000000001CDA000-memory.dmp

      Filesize

      3.3MB