Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-08-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
9b8f96489ef491a4378ae2552ee9950f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9b8f96489ef491a4378ae2552ee9950f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/vksn.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/vksn.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/vksn.dll
-
Size
20KB
-
MD5
e34c52bba24db2908916801f8e39b7a7
-
SHA1
d58cf73e0993109a2cd0a07c980682337186385b
-
SHA256
e203779a905288614ca814693eaf5841c2213ca6c9f2e6d127accbaf69e84c32
-
SHA512
0e5abbc376c252936fb9ae149d000aa15b971d3e49b8f224a3789750f9ccbd1d399ceec28318e4e34d00577ed4140baba6fbdb8c57f33f6fc43131bd2c036436
-
SSDEEP
384:bmgOuiCzcXBWIOrJ0mLQrVTqyYVP74ovLwZRNngH8QvlN:bvOuiCzOX6cpjYVP7/z4Nw7v
Malware Config
Extracted
xloader
2.5
ycnd
com-weekly.email
mfcon.net
bepcfinanceira.com
fattynoodlefitness.com
1pavij.cloud
sddn36.xyz
bestmoviequote.com
pntex.xyz
epicdefence.com
severiendepruis.online
spatialarray.com
aa6588.com
delucagiuseppe.com
xn--lu5bu5b0wddtl.com
staffingbackgrounds.com
miragetorrent.com
zdofmsk.online
charmsandfables.com
pifsdefistudio.com
paisacollection.com
clashofkingsgame.net
osakas.online
heyitsje.com
youlookverynice.space
quotextaiwan.com
davysbar.com
tcato.xyz
helpinghand.vote
themixedlifeacademy.com
tblaf.store
barbaracissie.top
grahambeller.com
24cto.com
afthvanderheijden.info
zoebiotech.com
sociwall.com
cisew.com
a-mic-i-di-sergio-zuni-no.com
himadecor.com
amadacncfanuc.com
25-tattvas.com
hhqm118.com
aszturia-jewelry.com
thepurldistrict.com
py5d.top
high-clicks.com
loveandsaffron.com
erie-holdings.com
greetwithgadgets.com
sddn17.xyz
profitdaly.space
jiayicnc.com
daniellebargo.com
healingpowerlife.com
the-leftorium.com
lpsfhls.com
jhtmr.com
rojasandrojas.com
theinbetweencolorado.com
canelausafm.com
dcpfp.com
feriaspravida.com
lokumgunu.xyz
46che.com
pollutepklucc.xyz
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2516-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2516-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2192-10-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1448 set thread context of 2516 1448 rundll32.exe 31 PID 2516 set thread context of 1200 2516 rundll32.exe 21 PID 2192 set thread context of 1200 2192 cmmon32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2516 rundll32.exe 2516 rundll32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe 2192 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 2192 cmmon32.exe 2192 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2516 rundll32.exe Token: SeDebugPrivilege 2192 cmmon32.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1448 1320 rundll32.exe 30 PID 1320 wrote to memory of 1448 1320 rundll32.exe 30 PID 1320 wrote to memory of 1448 1320 rundll32.exe 30 PID 1320 wrote to memory of 1448 1320 rundll32.exe 30 PID 1320 wrote to memory of 1448 1320 rundll32.exe 30 PID 1320 wrote to memory of 1448 1320 rundll32.exe 30 PID 1320 wrote to memory of 1448 1320 rundll32.exe 30 PID 1448 wrote to memory of 2516 1448 rundll32.exe 31 PID 1448 wrote to memory of 2516 1448 rundll32.exe 31 PID 1448 wrote to memory of 2516 1448 rundll32.exe 31 PID 1448 wrote to memory of 2516 1448 rundll32.exe 31 PID 1448 wrote to memory of 2516 1448 rundll32.exe 31 PID 1448 wrote to memory of 2516 1448 rundll32.exe 31 PID 1448 wrote to memory of 2516 1448 rundll32.exe 31 PID 1448 wrote to memory of 2516 1448 rundll32.exe 31 PID 1448 wrote to memory of 2516 1448 rundll32.exe 31 PID 1448 wrote to memory of 2516 1448 rundll32.exe 31 PID 1200 wrote to memory of 2192 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2192 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2192 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2192 1200 Explorer.EXE 32 PID 2192 wrote to memory of 2124 2192 cmmon32.exe 33 PID 2192 wrote to memory of 2124 2192 cmmon32.exe 33 PID 2192 wrote to memory of 2124 2192 cmmon32.exe 33 PID 2192 wrote to memory of 2124 2192 cmmon32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\vksn.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\vksn.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\vksn.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-