Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 09:13

General

  • Target

    5b4f0a86299caa8167044e4c66254290_JaffaCakes118.exe

  • Size

    365KB

  • MD5

    5b4f0a86299caa8167044e4c66254290

  • SHA1

    42a66629f75716d56790a610c404294e288224b1

  • SHA256

    e6cde5c1b614549613d30761b34c899f4ff69d7e6e3147c21d68bedd64f8fe25

  • SHA512

    3fecdc807f1b49a94794f5c37883df9d8fefafa63c94fe8e6fb3156cc136a1f5b50e601e0f2cd2339cf1830a31b2bb7eab25f281971006d4609fee2190755646

  • SSDEEP

    6144:c8LxBD6v9qhYrkSm7Yn8RYzf1NBpHxehm+XeM33rAyrV3YNriVEXHU:XYr9mgCYBjrGX19Ae0U

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ou3t

Decoy

toteitwithtara.com

scienbunny.com

stlukeumcaustin.com

hypnoticbeauty.net

artisanmakefurniture.com

usaonlinedrs.com

lifeshopdeluxe.com

paddlethepoosa.com

mobilismedlabs.net

iwumenssoccercamps.com

fjgsdgr.com

excelsiorhongkong.online

air.ink

grantopwincup.website

appi50dh.com

link-efootballpoin-konami.com

hukugiyho-life-no1.moe

azevedogroupdev.com

nichemedicalsupport.com

rastipponmkh.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b4f0a86299caa8167044e4c66254290_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5b4f0a86299caa8167044e4c66254290_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\5b4f0a86299caa8167044e4c66254290_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5b4f0a86299caa8167044e4c66254290_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsjCDBC.tmp\feczzkflxf.dll

    Filesize

    30KB

    MD5

    895a48f7b6d967eb813de8f96b0aca55

    SHA1

    821be080225a3415d6db2e6b269e841b0605ad93

    SHA256

    f00a637108b667cb6fc1c265c6e0fdcf650156d3100a6de084d430971ed03393

    SHA512

    5acd3940d4f55124c32a49325bdc8d59f2805882ea2c43b9b92db95861fb19ed3971a98f82cf3fffae42c2d243dbe2aaac05f50760adac4afd6a4065374dca60

  • memory/1312-7-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB

  • memory/1312-10-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB

  • memory/2688-9-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB