Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 22:30

General

  • Target

    81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe

  • Size

    535KB

  • MD5

    81fc1fc53243dca652b462d903eeba40

  • SHA1

    342e2fcbb9f3eba8dcffea5631ee8b1925884f80

  • SHA256

    f6b04e5510e9aea04907077edff587db5c4140c90179da4449c75aee787f0c73

  • SHA512

    ddf4968a3448ea50be115d9b30b7a7e4916438e0eefc985dca86f3013a1ef86a54f8efdcc3a28852be08662d13b404764a92ef0e86f001affa7ebe782fd8d8f1

  • SSDEEP

    12288:P2ACbYQjoiuM3JRI2QzP6+vvea2AZnre30:tCbYQjoBM3JRI1P6+vWadtrP

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

h3qo

Decoy

dhflow.com

jyindex.com

ezcleanhandle.com

trungtamcongdong.online

simsprotectionagency.com

easylivemeet.com

blackvikingfashionhouse.com

52banxue.com

girlsinit.com

drhemo.com

freethefarmers.com

velvetrosephotography.com

geometricbotaniclas.com

skyandspirit.com

deltacomunicacao.com

mucademy.com

jaboilfieldsolutions.net

howtowinatblackjacknow.com

anytimegrowth.com

simranluthra.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Beds Protector Packer 1 IoCs

    Detects Beds Protector packer used to load .NET malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4744
    • C:\Users\Admin\AppData\Local\Temp\81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\81fc1fc53243dca652b462d903eeba40_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4488
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 1180
      2⤵
      • Program crash
      PID:4808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4744 -ip 4744
    1⤵
      PID:3828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4488-8-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/4488-10-0x0000000000EF0000-0x000000000123A000-memory.dmp

      Filesize

      3.3MB

    • memory/4744-0-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

      Filesize

      4KB

    • memory/4744-1-0x0000000000360000-0x00000000003EA000-memory.dmp

      Filesize

      552KB

    • memory/4744-2-0x00000000053B0000-0x0000000005954000-memory.dmp

      Filesize

      5.6MB

    • memory/4744-3-0x0000000004E00000-0x0000000004E92000-memory.dmp

      Filesize

      584KB

    • memory/4744-4-0x0000000004D80000-0x0000000004DDE000-memory.dmp

      Filesize

      376KB

    • memory/4744-5-0x0000000004F50000-0x0000000004FEC000-memory.dmp

      Filesize

      624KB

    • memory/4744-6-0x0000000074D60000-0x0000000075510000-memory.dmp

      Filesize

      7.7MB

    • memory/4744-7-0x0000000004EB0000-0x0000000004EC6000-memory.dmp

      Filesize

      88KB

    • memory/4744-9-0x0000000005000000-0x000000000500A000-memory.dmp

      Filesize

      40KB

    • memory/4744-11-0x0000000074D60000-0x0000000075510000-memory.dmp

      Filesize

      7.7MB