Analysis

  • max time kernel
    95s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 08:51

General

  • Target

    f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe

  • Size

    647KB

  • MD5

    f1aeda7230a594789e453f1c79ecb109

  • SHA1

    ccfd3cc26c22d2bd3a7a898f8281d9ad15f16919

  • SHA256

    12cca0f706a412c3b9094a389be002b7afa465adaacefa5f70b1cefe83e33bff

  • SHA512

    b3dd5d5b37b6bfe27e5d768d60157f6a8e4415621330725c42865cb6c59906bb5aa65f09e9b40760b56227f458b4682e34ceafa8f8a77c52c2d8d8e948fd7682

  • SSDEEP

    12288:gC7ri0J3ZetpEYKD1kyVdR0ex86x+Ok6g5vk:gC3dZetpEH4eypOk6gZk

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

gh6n

Decoy

cpschoolsschoology.com

thestocksforum.com

pixiewish.com

sopressd.com

muktokontha.com

tiejiabang.net

fdo.technology

kuringnl.com

barbarapastor.com

21stcenturytrading.com

digiwarung.com

canvafynyc.com

forfaitinghouse.com

3704368.com

mymonwero.com

ponpow.com

fringe.golf

heartfeltindonesia.com

defensivedrivercpc.com

allaboutgt.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f1aeda7230a594789e453f1c79ecb109_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:5020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2840-6-0x0000000004D40000-0x0000000004D4A000-memory.dmp

    Filesize

    40KB

  • memory/2840-8-0x0000000074A0E000-0x0000000074A0F000-memory.dmp

    Filesize

    4KB

  • memory/2840-2-0x00000000052A0000-0x0000000005844000-memory.dmp

    Filesize

    5.6MB

  • memory/2840-3-0x0000000004D90000-0x0000000004E22000-memory.dmp

    Filesize

    584KB

  • memory/2840-4-0x0000000004E30000-0x0000000004ECC000-memory.dmp

    Filesize

    624KB

  • memory/2840-5-0x0000000074A00000-0x00000000751B0000-memory.dmp

    Filesize

    7.7MB

  • memory/2840-1-0x00000000002E0000-0x0000000000388000-memory.dmp

    Filesize

    672KB

  • memory/2840-7-0x00000000051C0000-0x00000000051CA000-memory.dmp

    Filesize

    40KB

  • memory/2840-0-0x0000000074A0E000-0x0000000074A0F000-memory.dmp

    Filesize

    4KB

  • memory/2840-9-0x0000000074A00000-0x00000000751B0000-memory.dmp

    Filesize

    7.7MB

  • memory/2840-10-0x0000000005C60000-0x0000000005CBC000-memory.dmp

    Filesize

    368KB

  • memory/2840-13-0x0000000074A00000-0x00000000751B0000-memory.dmp

    Filesize

    7.7MB

  • memory/5020-11-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/5020-14-0x00000000016B0000-0x00000000019FA000-memory.dmp

    Filesize

    3.3MB

  • memory/5020-15-0x00000000016B0000-0x00000000019FA000-memory.dmp

    Filesize

    3.3MB