Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 09:01

General

  • Target

    6eede7c5b08dcd2860119d4f456be572_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    6eede7c5b08dcd2860119d4f456be572

  • SHA1

    9d47c2ac288d9cee2b79dec75fc4f6b6b0ab0fb2

  • SHA256

    5a88f2832e625232b811db9715dcbb1058f9b33ae86677a95c3482ba66f2b98f

  • SHA512

    49a5a2c1e1ab9a26cdcf93711cc2c54a34f686feeec6bbb57a71cefb31d3f914d31afa0e1fe6edbfdf6220635e33245d36e29a8f14f691f03f66fef3c7df598a

  • SSDEEP

    24576:ZNmnNPidL6R8S4RMkLWRzFGscXzmExOEY4UJKW1mTLFeCXDMDYxN7:eNtzGsmY4UJKW1mTLFeCXDMDYxN

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

bw82

Decoy

fundamentaliemef.com

gallerybrows.com

leadeligey.com

octoberx2.online

climaxnovels.com

gdsjgf.com

curateherstories.com

blacksailus.com

yjpps.com

gmobilet.com

fcoins.club

foreverlive2027.com

healthyfifties.com

wmarquezy.com

housebulb.com

thebabyfriendly.com

primajayaintiperkasa.com

learnplaychess.com

chrisbubser.digital

xn--avenr-wsa.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6eede7c5b08dcd2860119d4f456be572_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6eede7c5b08dcd2860119d4f456be572_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\6eede7c5b08dcd2860119d4f456be572_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\6eede7c5b08dcd2860119d4f456be572_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1620-6-0x0000000000B10000-0x0000000000B66000-memory.dmp

    Filesize

    344KB

  • memory/1620-1-0x0000000000130000-0x0000000000314000-memory.dmp

    Filesize

    1.9MB

  • memory/1620-2-0x0000000074180000-0x000000007486E000-memory.dmp

    Filesize

    6.9MB

  • memory/1620-3-0x00000000004E0000-0x00000000004EA000-memory.dmp

    Filesize

    40KB

  • memory/1620-4-0x000000007418E000-0x000000007418F000-memory.dmp

    Filesize

    4KB

  • memory/1620-5-0x0000000074180000-0x000000007486E000-memory.dmp

    Filesize

    6.9MB

  • memory/1620-0-0x000000007418E000-0x000000007418F000-memory.dmp

    Filesize

    4KB

  • memory/1620-14-0x0000000074180000-0x000000007486E000-memory.dmp

    Filesize

    6.9MB

  • memory/2360-7-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2360-9-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2360-13-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2360-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2360-15-0x0000000000AF0000-0x0000000000DF3000-memory.dmp

    Filesize

    3.0MB