Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
5b4f0a86299caa8167044e4c66254290_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b4f0a86299caa8167044e4c66254290_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/feczzkflxf.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/feczzkflxf.dll
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/feczzkflxf.dll
-
Size
30KB
-
MD5
895a48f7b6d967eb813de8f96b0aca55
-
SHA1
821be080225a3415d6db2e6b269e841b0605ad93
-
SHA256
f00a637108b667cb6fc1c265c6e0fdcf650156d3100a6de084d430971ed03393
-
SHA512
5acd3940d4f55124c32a49325bdc8d59f2805882ea2c43b9b92db95861fb19ed3971a98f82cf3fffae42c2d243dbe2aaac05f50760adac4afd6a4065374dca60
-
SSDEEP
768:nYYsBQJDh7wN4Ce10NUW5gPO8P9MOVnF06ZTt07IKt:nIBQJDPGgPO8P9vnF06P07J
Malware Config
Extracted
xloader
2.5
ou3t
toteitwithtara.com
scienbunny.com
stlukeumcaustin.com
hypnoticbeauty.net
artisanmakefurniture.com
usaonlinedrs.com
lifeshopdeluxe.com
paddlethepoosa.com
mobilismedlabs.net
iwumenssoccercamps.com
fjgsdgr.com
excelsiorhongkong.online
air.ink
grantopwincup.website
appi50dh.com
link-efootballpoin-konami.com
hukugiyho-life-no1.moe
azevedogroupdev.com
nichemedicalsupport.com
rastipponmkh.com
sto327.com
lingdibao.xyz
329895tyc.com
prefferably.com
hidrauforte.com
sultanepin.com
aj5w2.xyz
furniture-newoffice.com
taru-game.com
silkyskin.one
paperdriver-navi.net
dalixfr.com
northalabamahome.com
braapboxclub.com
mainlandpr.com
thrivinginmotherhood.com
netlnterbank.com
gameprizes.xyz
blue-branch.com
fsmsandbox-drsetup.com
trianglepresentations.com
rnmes.com
shadowwitch.xyz
thehaoi.com
webplayerscandictv2.com
atomizer.xyz
sridhar-rangaswamy.club
willcodesign.com
jsconcreteprosfremont.com
tridimensioned.com
mugsmindset.online
calicorealtygroup.net
beansmagic.com
apan-group.com
latestgift1.com
clearberth.com
bucksplit.com
nftagents.xyz
whukares.com
texasccr.com
santanderburge.com
squadfit.club
gulftradinggambia.com
gratitudeideas.com
ibexgrp.com
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral3/memory/1220-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/1220-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/1220-10-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2840-15-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2088 set thread context of 1220 2088 rundll32.exe 32 PID 1220 set thread context of 1188 1220 rundll32.exe 21 PID 1220 set thread context of 1188 1220 rundll32.exe 21 PID 2840 set thread context of 1188 2840 cmd.exe 21 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1220 rundll32.exe 1220 rundll32.exe 1220 rundll32.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe 2840 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1220 rundll32.exe 1220 rundll32.exe 1220 rundll32.exe 1220 rundll32.exe 2840 cmd.exe 2840 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1220 rundll32.exe Token: SeDebugPrivilege 2840 cmd.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2088 2628 rundll32.exe 31 PID 2628 wrote to memory of 2088 2628 rundll32.exe 31 PID 2628 wrote to memory of 2088 2628 rundll32.exe 31 PID 2628 wrote to memory of 2088 2628 rundll32.exe 31 PID 2628 wrote to memory of 2088 2628 rundll32.exe 31 PID 2628 wrote to memory of 2088 2628 rundll32.exe 31 PID 2628 wrote to memory of 2088 2628 rundll32.exe 31 PID 2088 wrote to memory of 1220 2088 rundll32.exe 32 PID 2088 wrote to memory of 1220 2088 rundll32.exe 32 PID 2088 wrote to memory of 1220 2088 rundll32.exe 32 PID 2088 wrote to memory of 1220 2088 rundll32.exe 32 PID 2088 wrote to memory of 1220 2088 rundll32.exe 32 PID 2088 wrote to memory of 1220 2088 rundll32.exe 32 PID 2088 wrote to memory of 1220 2088 rundll32.exe 32 PID 2088 wrote to memory of 1220 2088 rundll32.exe 32 PID 2088 wrote to memory of 1220 2088 rundll32.exe 32 PID 2088 wrote to memory of 1220 2088 rundll32.exe 32 PID 1188 wrote to memory of 2840 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2840 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2840 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2840 1188 Explorer.EXE 33 PID 2840 wrote to memory of 2696 2840 cmd.exe 34 PID 2840 wrote to memory of 2696 2840 cmd.exe 34 PID 2840 wrote to memory of 2696 2840 cmd.exe 34 PID 2840 wrote to memory of 2696 2840 cmd.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\feczzkflxf.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\feczzkflxf.dll,#13⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\feczzkflxf.dll,#14⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵PID:2696
-
-