Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 09:25

General

  • Target

    2ea57e03a2e9da369e190a028d159045_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    2ea57e03a2e9da369e190a028d159045

  • SHA1

    a367485284f0f3399f6f3f8a8649ff27d72271be

  • SHA256

    19b682f4983833b4f3670a22763a06cad7476076ea99a6800e7dbc8732431fd8

  • SHA512

    9367e3b70e9c136ec59d74879332ef5d1a9342588067aa87c41a3b00a5fb188e9676f354070c4bf26b58ca40f43d6db46f18d99de613cd8d5eba673dd753678e

  • SSDEEP

    24576:tggDThVH+3nPxT6f5MBzhfyUTAXVNT2fXdvO9:ugR1+3nPF6m3fulNT2/

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

uecu

Decoy

ishtarhotel.com

woodstrends.icu

jalenowens.com

manno.expert

ssg1asia.com

telepathylaw.com

quickoprintnv.com

abrosnm3.com

lumberjackcatering.com

beachujamaica.com

thomasjeffersonbyrd.com

starryfinds.com

shelavish2.com

royalglamempirellc.com

deixandomeuemprego.com

alexgoestech.xyz

opticamn.com

fermanchevybrandon.com

milbodegas.info

adunarsrl.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\2ea57e03a2e9da369e190a028d159045_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2ea57e03a2e9da369e190a028d159045_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2904
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 268
        3⤵
        • Program crash
        PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1252-18-0x0000000004120000-0x0000000004206000-memory.dmp

    Filesize

    920KB

  • memory/1252-25-0x0000000004120000-0x0000000004206000-memory.dmp

    Filesize

    920KB

  • memory/1924-6-0x0000000005440000-0x00000000054DE000-memory.dmp

    Filesize

    632KB

  • memory/1924-3-0x0000000074110000-0x00000000747FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1924-4-0x000000007411E000-0x000000007411F000-memory.dmp

    Filesize

    4KB

  • memory/1924-5-0x0000000074110000-0x00000000747FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1924-2-0x0000000000260000-0x000000000027E000-memory.dmp

    Filesize

    120KB

  • memory/1924-7-0x0000000000660000-0x000000000068E000-memory.dmp

    Filesize

    184KB

  • memory/1924-1-0x00000000008D0000-0x0000000000A40000-memory.dmp

    Filesize

    1.4MB

  • memory/1924-0-0x000000007411E000-0x000000007411F000-memory.dmp

    Filesize

    4KB

  • memory/1924-13-0x0000000074110000-0x00000000747FE000-memory.dmp

    Filesize

    6.9MB

  • memory/2772-22-0x0000000000270000-0x0000000000284000-memory.dmp

    Filesize

    80KB

  • memory/2772-20-0x0000000000270000-0x0000000000284000-memory.dmp

    Filesize

    80KB

  • memory/2772-19-0x0000000000270000-0x0000000000284000-memory.dmp

    Filesize

    80KB

  • memory/2904-9-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2904-16-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2904-17-0x0000000000100000-0x0000000000110000-memory.dmp

    Filesize

    64KB

  • memory/2904-14-0x00000000008F0000-0x0000000000BF3000-memory.dmp

    Filesize

    3.0MB

  • memory/2904-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2904-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2904-12-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB