Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 15:31

General

  • Target

    bc525d61492045490d2881099da3b8c4_JaffaCakes118.exe

  • Size

    981KB

  • MD5

    bc525d61492045490d2881099da3b8c4

  • SHA1

    84f2c141d5edf7e0d7d3ff021272aad17c100705

  • SHA256

    e2f640f8cdc89a54ecd8d1a0c8d4b8a4d1e6560f086fd82d05e0010d95a1d9e9

  • SHA512

    ee7e7bf3422597f784d905e6329e4e8ba0746859d84dcbeeece885283f76c3260c1b687e0f0840d15a96c2c50d1b029931b59491f20c950173e20ac639b65297

  • SSDEEP

    12288:jWMJquNkjksJG0BTD9ZgnEGBLHWTcQC75/muDGR3wI+5jypW9+xngOkm3y42zYp1:jNpQThBTD7gn0g4Co7+oSmgOk

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

bw82

Decoy

fundamentaliemef.com

gallerybrows.com

leadeligey.com

octoberx2.online

climaxnovels.com

gdsjgf.com

curateherstories.com

blacksailus.com

yjpps.com

gmobilet.com

fcoins.club

foreverlive2027.com

healthyfifties.com

wmarquezy.com

housebulb.com

thebabyfriendly.com

primajayaintiperkasa.com

learnplaychess.com

chrisbubser.digital

xn--avenr-wsa.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc525d61492045490d2881099da3b8c4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc525d61492045490d2881099da3b8c4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Local\Temp\bc525d61492045490d2881099da3b8c4_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\bc525d61492045490d2881099da3b8c4_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1884-12-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1884-15-0x0000000001920000-0x0000000001C6A000-memory.dmp

    Filesize

    3.3MB

  • memory/4616-6-0x0000000075370000-0x0000000075B20000-memory.dmp

    Filesize

    7.7MB

  • memory/4616-3-0x00000000083A0000-0x0000000008944000-memory.dmp

    Filesize

    5.6MB

  • memory/4616-4-0x0000000007DF0000-0x0000000007E82000-memory.dmp

    Filesize

    584KB

  • memory/4616-5-0x0000000005360000-0x000000000536A000-memory.dmp

    Filesize

    40KB

  • memory/4616-0-0x000000007537E000-0x000000007537F000-memory.dmp

    Filesize

    4KB

  • memory/4616-7-0x0000000007F80000-0x0000000007FD6000-memory.dmp

    Filesize

    344KB

  • memory/4616-8-0x0000000008150000-0x000000000815A000-memory.dmp

    Filesize

    40KB

  • memory/4616-9-0x000000007537E000-0x000000007537F000-memory.dmp

    Filesize

    4KB

  • memory/4616-10-0x0000000075370000-0x0000000075B20000-memory.dmp

    Filesize

    7.7MB

  • memory/4616-11-0x0000000008AB0000-0x0000000008B0E000-memory.dmp

    Filesize

    376KB

  • memory/4616-2-0x0000000007D50000-0x0000000007DEC000-memory.dmp

    Filesize

    624KB

  • memory/4616-14-0x0000000075370000-0x0000000075B20000-memory.dmp

    Filesize

    7.7MB

  • memory/4616-1-0x0000000000D80000-0x0000000000E7C000-memory.dmp

    Filesize

    1008KB