Analysis

  • max time kernel
    134s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2024 16:54

General

  • Target

    abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe

  • Size

    797KB

  • MD5

    abd030bf8bc89061525172a66d7b3529

  • SHA1

    75a5b2bf4b045b15e28d57f644acb346f94a828a

  • SHA256

    8c40d61e9bc6b4bae1468a3ad4f944512a2b5abe3ac440b961efb6c7c490f248

  • SHA512

    5423857f45d59bf5f03f460b77a8decfc40d8bbb2071f97441df87705dfc39b38dfcb9a3c3570f2661b70893d63b49293270dc3522f2171b90152ca5a46eaf26

  • SSDEEP

    12288:FC5C59YV6MorX7qzuC3QHO9FQVHPF51jgctrcdX/xfLZK+jNnhvu11JlDk3C47Co:eBXu9HGaVHGxFtK+ZhQ4ZD

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

fpdi

Decoy

jencio.com

b9jty7.com

banahinvestments.com

capitolfurniture.net

jlvip1086.com

pompeyocargo.com

designbyshubhi.info

elbauldepecas.com

bracelexx.online

advanceporbrx.xyz

ruihongco.com

wipemirecord.com

goodfoodsme.com

sommpick.com

rangilugujarat.com

realestate5g.com

spunkdlashes.com

palisadestahoehousing.com

brandingsocal.com

privatejetsboston.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3280
    • C:\Users\Admin\AppData\Local\Temp\abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\abd030bf8bc89061525172a66d7b3529_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4112-2-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB