Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 23:18

General

  • Target

    26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    26eeb1f0e1206232f233d3710729a98a

  • SHA1

    2f49292e05aa8a155372c0856103131285fae88b

  • SHA256

    ecd73f67ea2121ce3aa6ad9e7a63b5360ee5b928c94b69956d8227f54a951349

  • SHA512

    37b10ee98d3a8775c308d61a88b74a5938815c8bcd272713ab9446a99af68d28ab7e5c06adf03e7a5a9edd4e2bebbfb9c3af0ca5e1df51539a33e30ffa4dc77e

  • SSDEEP

    12288:yccaQxt8aq8vbgDPwFVt2NjFjO+ckz9EIFpR6lyLr4ukkknvlP7r9r/+pppppppb:bGb0wFVMNjs9E6QfEvl1+

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

xcw2

Decoy

expdallastx.com

vedanshhomoeopathy.com

ssmt66.com

echomc.xyz

myclarityplanner.com

abrosnm3.com

unitandrea.icu

dftuned.com

sbamilkingmachinery.com

lifesongmidwife.com

crepkonnect.com

reevoy.info

warisanoranglama.com

geotekmapping.com

eert.net

pcmajstor.com

32sj6dxrkx8pfp.xyz

zoomaconsultation.com

vinilikes.com

superbrandsstore.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\26eeb1f0e1206232f233d3710729a98a_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2292-6-0x00000000084B0000-0x000000000854E000-memory.dmp

    Filesize

    632KB

  • memory/2292-0-0x000000007446E000-0x000000007446F000-memory.dmp

    Filesize

    4KB

  • memory/2292-2-0x0000000074460000-0x0000000074B4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2292-3-0x00000000009C0000-0x00000000009DA000-memory.dmp

    Filesize

    104KB

  • memory/2292-4-0x000000007446E000-0x000000007446F000-memory.dmp

    Filesize

    4KB

  • memory/2292-5-0x0000000074460000-0x0000000074B4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2292-1-0x0000000000CC0000-0x0000000000DCE000-memory.dmp

    Filesize

    1.1MB

  • memory/2292-7-0x0000000000B30000-0x0000000000B5E000-memory.dmp

    Filesize

    184KB

  • memory/2292-15-0x0000000074460000-0x0000000074B4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2596-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2596-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2596-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2596-14-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2596-16-0x0000000000DD0000-0x00000000010D3000-memory.dmp

    Filesize

    3.0MB