Analysis

  • max time kernel
    94s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2024 09:28

General

  • Target

    99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe

  • Size

    494KB

  • MD5

    99bc4a27617c8033e99798b86bf83139

  • SHA1

    6ae1c65f9659fabf006c073f073cfdbbfe110534

  • SHA256

    ba4821ef0b5dc9843ab5947e85b9810f3a96d0cdf2e9055761dc89f546ae9f93

  • SHA512

    1aea828dd78522e007525d2800b0dac003607c5737437641ab76fc7266cc36dcb9e956f451e7fb060b2c8dcc98271df683a3e316727e58f9291181d2965baf27

  • SSDEEP

    12288:FC0OjH/B15Ow35hQVwXJxcZwnEQ8J0F6zeX7KD/h1ZEk6eP9Ap1kZL:ADjf35Ou7PWvQ8Ja6zee7xv6+AC

Malware Config

Extracted

Family

xloader

Version

2.1

Campaign

eao

Decoy

littletram.com

vanmetaal.com

clubbingspringbreak.com

intohuman.com

steph.place

ipsumksa.com

paultoon.com

wocwebowecbweogw.com

beverlyhillsmerch.com

vans-athens.com

stylishnailsbyem.com

milletvit.com

pappyjacksburgershack.com

anal-liza.com

lotownerbuilders.com

caffinatics.com

cvbtrading.co.uk

pheasanttrailsgolfcourse.com

wed0888.com

sundeepm.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Users\Admin\AppData\Local\Temp\99bc4a27617c8033e99798b86bf83139_JaffaCakes118.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3016-12-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3016-15-0x0000000001180000-0x00000000014CA000-memory.dmp

    Filesize

    3.3MB

  • memory/4532-6-0x0000000006760000-0x00000000067FC000-memory.dmp

    Filesize

    624KB

  • memory/4532-3-0x0000000005500000-0x0000000005592000-memory.dmp

    Filesize

    584KB

  • memory/4532-4-0x0000000074510000-0x0000000074CC0000-memory.dmp

    Filesize

    7.7MB

  • memory/4532-5-0x00000000054C0000-0x00000000054CA000-memory.dmp

    Filesize

    40KB

  • memory/4532-0-0x000000007451E000-0x000000007451F000-memory.dmp

    Filesize

    4KB

  • memory/4532-7-0x00000000059F0000-0x0000000005A02000-memory.dmp

    Filesize

    72KB

  • memory/4532-8-0x000000007451E000-0x000000007451F000-memory.dmp

    Filesize

    4KB

  • memory/4532-9-0x0000000074510000-0x0000000074CC0000-memory.dmp

    Filesize

    7.7MB

  • memory/4532-10-0x0000000007EA0000-0x0000000007EF4000-memory.dmp

    Filesize

    336KB

  • memory/4532-11-0x000000000A560000-0x000000000A5A0000-memory.dmp

    Filesize

    256KB

  • memory/4532-2-0x0000000005A10000-0x0000000005FB4000-memory.dmp

    Filesize

    5.6MB

  • memory/4532-14-0x0000000074510000-0x0000000074CC0000-memory.dmp

    Filesize

    7.7MB

  • memory/4532-1-0x0000000000A80000-0x0000000000B02000-memory.dmp

    Filesize

    520KB