Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 10:38

General

  • Target

    8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe

  • Size

    454KB

  • MD5

    8e6b004fb91c81b531eb93c36fb0544c

  • SHA1

    ac34c999e62735c6c117507e0fe97dbe0ff30974

  • SHA256

    36dabaa854dac855255b08b096a1fb6cee39f910dfbd2101812a0c5d33b1a983

  • SHA512

    f5c68042a19510f01f67b574d4a0e225e0c7d311571298ecd374f40de2aac6aa95a94a1f32dcc980ed4f1091904747724750d2544b2184451336abbe9a62fb12

  • SSDEEP

    12288:kJCnJC/EMYLysUN8d5k/PrNZIec8NlgTHYDZ0dtN:hc/EMwrd5QPRZLPlgsd

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

mt6e

Decoy

morozolga.com

selimtokdemir.com

deluxeweldingsupply.com

allannateddyrose.com

iconsneakersfr.com

vicenteconchilla.com

themediatenow.com

finishmybasemint.com

blaseskincare.com

betwho.site

madewithrealmeat.com

scratchpatchinc.com

daysad.com

kraftwater.com

prolifictrades.com

usdtmgm.com

mooneworms.com

grandspecialiste.com

mirzaassociates.com

bilaltahirofficial.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Beds Protector Packer 1 IoCs

    Detects Beds Protector packer used to load .NET malware.

  • Xloader payload 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3848
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
        3⤵
        • Drops startup file
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2124
      • C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe"
        3⤵
          PID:1360
        • C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe"
          3⤵
            PID:1300
          • C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\8e6b004fb91c81b531eb93c36fb0544c_JaffaCakes118.exe"
            3⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:464
            • C:\Users\Admin\AppData\Local\Temp\FB_2333.tmp.exe
              "C:\Users\Admin\AppData\Local\Temp\FB_2333.tmp.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:452
            • C:\Users\Admin\AppData\Local\Temp\FB_240E.tmp.exe
              "C:\Users\Admin\AppData\Local\Temp\FB_240E.tmp.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:4368
        • C:\Windows\SysWOW64\wlanext.exe
          "C:\Windows\SysWOW64\wlanext.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4032
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Users\Admin\AppData\Local\Temp\FB_240E.tmp.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:5080

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\FB_2333.tmp.exe

        Filesize

        3KB

        MD5

        74bafb3e707c7b0c63938ac200f99c7f

        SHA1

        10c5506337845ed9bf25c73d2506f9c15ab8e608

        SHA256

        129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689

        SHA512

        5b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781

      • C:\Users\Admin\AppData\Local\Temp\FB_240E.tmp.exe

        Filesize

        161KB

        MD5

        9fdbb8c244d070ce68c9c2b0bf77f2e7

        SHA1

        c8a687f5ddd27c1a2fa81326a1b02b8baf7c324b

        SHA256

        71cc6247ea30d4a06a8882e853c57789b4aa7114f2e94fd7186822b55bb41f11

        SHA512

        30ac36503c89867fb3343e02ded5b66a02a115cc418d25012b9b2cb448c735c8fc22f449296cc274da7b55729216d590ce84c761fff58634ac5c8efb75add431

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bpfbotae.oc3.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/464-30-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/464-35-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/464-33-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2124-9-0x0000000002A60000-0x0000000002A96000-memory.dmp

        Filesize

        216KB

      • memory/2124-52-0x0000000007320000-0x00000000073B6000-memory.dmp

        Filesize

        600KB

      • memory/2124-58-0x0000000074910000-0x00000000750C0000-memory.dmp

        Filesize

        7.7MB

      • memory/2124-54-0x00000000068D0000-0x00000000068F2000-memory.dmp

        Filesize

        136KB

      • memory/2124-10-0x0000000074910000-0x00000000750C0000-memory.dmp

        Filesize

        7.7MB

      • memory/2124-11-0x0000000074910000-0x00000000750C0000-memory.dmp

        Filesize

        7.7MB

      • memory/2124-13-0x0000000074910000-0x00000000750C0000-memory.dmp

        Filesize

        7.7MB

      • memory/2124-12-0x0000000005540000-0x0000000005B68000-memory.dmp

        Filesize

        6.2MB

      • memory/2124-14-0x00000000053C0000-0x00000000053E2000-memory.dmp

        Filesize

        136KB

      • memory/2124-15-0x0000000005BE0000-0x0000000005C46000-memory.dmp

        Filesize

        408KB

      • memory/2124-16-0x0000000005C50000-0x0000000005CB6000-memory.dmp

        Filesize

        408KB

      • memory/2124-53-0x0000000006850000-0x000000000686A000-memory.dmp

        Filesize

        104KB

      • memory/2124-26-0x0000000005D40000-0x0000000006094000-memory.dmp

        Filesize

        3.3MB

      • memory/2124-27-0x0000000006360000-0x000000000637E000-memory.dmp

        Filesize

        120KB

      • memory/2124-28-0x00000000063A0000-0x00000000063EC000-memory.dmp

        Filesize

        304KB

      • memory/3372-64-0x0000000008790000-0x0000000008888000-memory.dmp

        Filesize

        992KB

      • memory/3848-1-0x0000000000200000-0x0000000000278000-memory.dmp

        Filesize

        480KB

      • memory/3848-6-0x0000000074910000-0x00000000750C0000-memory.dmp

        Filesize

        7.7MB

      • memory/3848-4-0x0000000004CB0000-0x0000000004D14000-memory.dmp

        Filesize

        400KB

      • memory/3848-3-0x0000000004C10000-0x0000000004CA2000-memory.dmp

        Filesize

        584KB

      • memory/3848-2-0x0000000005110000-0x00000000056B4000-memory.dmp

        Filesize

        5.6MB

      • memory/3848-29-0x0000000004DB0000-0x0000000004DC6000-memory.dmp

        Filesize

        88KB

      • memory/3848-7-0x000000007491E000-0x000000007491F000-memory.dmp

        Filesize

        4KB

      • memory/3848-36-0x0000000074910000-0x00000000750C0000-memory.dmp

        Filesize

        7.7MB

      • memory/3848-0-0x000000007491E000-0x000000007491F000-memory.dmp

        Filesize

        4KB

      • memory/3848-8-0x0000000074910000-0x00000000750C0000-memory.dmp

        Filesize

        7.7MB

      • memory/3848-5-0x0000000004DF0000-0x0000000004E8C000-memory.dmp

        Filesize

        624KB

      • memory/4032-60-0x0000000000CC0000-0x0000000000CD7000-memory.dmp

        Filesize

        92KB

      • memory/4032-61-0x0000000000470000-0x0000000000499000-memory.dmp

        Filesize

        164KB

      • memory/4032-59-0x0000000000CC0000-0x0000000000CD7000-memory.dmp

        Filesize

        92KB