Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2024 19:47

General

  • Target

    247e2ce013cbda5db987f42355048389_JaffaCakes118.exe

  • Size

    708KB

  • MD5

    247e2ce013cbda5db987f42355048389

  • SHA1

    1709f83e2066fbbfc9cac502807cb733ebafed6d

  • SHA256

    778a433f0c438f5f4ad261e0c14d350e37f10d8fe4ca7794da84052aa114f94c

  • SHA512

    118680110ef4ba7d344861f052a9d28a1d3a2b2095c0e365ede6341fda44a06faf74b75ab087cd3618020e7c4ef3eca556fbbb4aa63106beb9ea23e04751f5f3

  • SSDEEP

    12288:NNSj3CYRyjC5bhPCd16IUjlNktoJEq/y6INX6LRgU7e9Yn33PZfqFszaldJmlgeF:5CVhPfNDktoGq/wKgDC3hiUaldq5LgA6

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

s32s

Decoy

pointsfans.com

eternalbybri.com

rajspices.com

evisucdn.com

cunerier.com

meteoagriculture.com

uplighting.net

tomigata.com

dilemmastudio.com

13kirikiriroad.com

lostboysworld.online

anemonashop.com

baiexpress.com

1033391.com

healthandsafetygadgets.com

hawaiiicelimited.com

wheels.works

post89paks.com

hangsicantho.com

theforteners.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3456
    • C:\Users\Admin\AppData\Local\Temp\247e2ce013cbda5db987f42355048389_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\247e2ce013cbda5db987f42355048389_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
        "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2084
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe

    Filesize

    42KB

    MD5

    9827ff3cdf4b83f9c86354606736ca9c

    SHA1

    e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723

    SHA256

    c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a

    SHA512

    8261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579

  • memory/1176-13-0x00000000051D0000-0x00000000051D6000-memory.dmp

    Filesize

    24KB

  • memory/1176-3-0x0000000006170000-0x0000000006714000-memory.dmp

    Filesize

    5.6MB

  • memory/1176-1-0x0000000000D30000-0x0000000000DE8000-memory.dmp

    Filesize

    736KB

  • memory/1176-18-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/1176-5-0x0000000005C60000-0x0000000005CFC000-memory.dmp

    Filesize

    624KB

  • memory/1176-6-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/1176-7-0x00000000072E0000-0x0000000007318000-memory.dmp

    Filesize

    224KB

  • memory/1176-8-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/1176-9-0x0000000074EEE000-0x0000000074EEF000-memory.dmp

    Filesize

    4KB

  • memory/1176-10-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/1176-12-0x00000000051B0000-0x00000000051C4000-memory.dmp

    Filesize

    80KB

  • memory/1176-0-0x0000000074EEE000-0x0000000074EEF000-memory.dmp

    Filesize

    4KB

  • memory/1176-4-0x0000000005BC0000-0x0000000005C52000-memory.dmp

    Filesize

    584KB

  • memory/1176-2-0x0000000005720000-0x0000000005A74000-memory.dmp

    Filesize

    3.3MB

  • memory/2084-19-0x0000000001550000-0x000000000189A000-memory.dmp

    Filesize

    3.3MB

  • memory/2084-21-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2084-22-0x0000000001260000-0x0000000001271000-memory.dmp

    Filesize

    68KB

  • memory/2084-15-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3456-35-0x00000000081D0000-0x0000000008352000-memory.dmp

    Filesize

    1.5MB

  • memory/3456-23-0x0000000007CC0000-0x0000000007E3D000-memory.dmp

    Filesize

    1.5MB

  • memory/3456-28-0x0000000007CC0000-0x0000000007E3D000-memory.dmp

    Filesize

    1.5MB

  • memory/3456-32-0x00000000081D0000-0x0000000008352000-memory.dmp

    Filesize

    1.5MB

  • memory/3456-33-0x00000000081D0000-0x0000000008352000-memory.dmp

    Filesize

    1.5MB

  • memory/4872-24-0x0000000000DB0000-0x0000000000DBB000-memory.dmp

    Filesize

    44KB

  • memory/4872-25-0x0000000000DB0000-0x0000000000DBB000-memory.dmp

    Filesize

    44KB

  • memory/4872-27-0x00000000009A0000-0x00000000009C9000-memory.dmp

    Filesize

    164KB