Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 09:25

General

  • Target

    2ea57e03a2e9da369e190a028d159045_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    2ea57e03a2e9da369e190a028d159045

  • SHA1

    a367485284f0f3399f6f3f8a8649ff27d72271be

  • SHA256

    19b682f4983833b4f3670a22763a06cad7476076ea99a6800e7dbc8732431fd8

  • SHA512

    9367e3b70e9c136ec59d74879332ef5d1a9342588067aa87c41a3b00a5fb188e9676f354070c4bf26b58ca40f43d6db46f18d99de613cd8d5eba673dd753678e

  • SSDEEP

    24576:tggDThVH+3nPxT6f5MBzhfyUTAXVNT2fXdvO9:ugR1+3nPF6m3fulNT2/

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

uecu

Decoy

ishtarhotel.com

woodstrends.icu

jalenowens.com

manno.expert

ssg1asia.com

telepathylaw.com

quickoprintnv.com

abrosnm3.com

lumberjackcatering.com

beachujamaica.com

thomasjeffersonbyrd.com

starryfinds.com

shelavish2.com

royalglamempirellc.com

deixandomeuemprego.com

alexgoestech.xyz

opticamn.com

fermanchevybrandon.com

milbodegas.info

adunarsrl.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\2ea57e03a2e9da369e190a028d159045_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2ea57e03a2e9da369e190a028d159045_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3792
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:1368
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\SysWOW64\rundll32.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3092
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2568

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3092-24-0x00000000004B0000-0x00000000004D8000-memory.dmp

      Filesize

      160KB

    • memory/3092-23-0x0000000000B80000-0x0000000000B94000-memory.dmp

      Filesize

      80KB

    • memory/3092-21-0x0000000000B80000-0x0000000000B94000-memory.dmp

      Filesize

      80KB

    • memory/3428-30-0x0000000008E30000-0x0000000008FBD000-memory.dmp

      Filesize

      1.6MB

    • memory/3428-29-0x0000000008E30000-0x0000000008FBD000-memory.dmp

      Filesize

      1.6MB

    • memory/3428-25-0x00000000030F0000-0x00000000031AF000-memory.dmp

      Filesize

      764KB

    • memory/3428-20-0x00000000030F0000-0x00000000031AF000-memory.dmp

      Filesize

      764KB

    • memory/3792-13-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3792-19-0x0000000001BE0000-0x0000000001BF0000-memory.dmp

      Filesize

      64KB

    • memory/3792-18-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3792-16-0x0000000001780000-0x0000000001ACA000-memory.dmp

      Filesize

      3.3MB

    • memory/5016-6-0x00000000052A0000-0x00000000052F6000-memory.dmp

      Filesize

      344KB

    • memory/5016-7-0x00000000747E0000-0x0000000074F90000-memory.dmp

      Filesize

      7.7MB

    • memory/5016-11-0x0000000005FD0000-0x000000000606E000-memory.dmp

      Filesize

      632KB

    • memory/5016-15-0x00000000747E0000-0x0000000074F90000-memory.dmp

      Filesize

      7.7MB

    • memory/5016-10-0x00000000747E0000-0x0000000074F90000-memory.dmp

      Filesize

      7.7MB

    • memory/5016-9-0x00000000747EE000-0x00000000747EF000-memory.dmp

      Filesize

      4KB

    • memory/5016-8-0x0000000005240000-0x000000000525E000-memory.dmp

      Filesize

      120KB

    • memory/5016-12-0x0000000005DC0000-0x0000000005DEE000-memory.dmp

      Filesize

      184KB

    • memory/5016-0-0x00000000747EE000-0x00000000747EF000-memory.dmp

      Filesize

      4KB

    • memory/5016-5-0x0000000004FC0000-0x0000000004FCA000-memory.dmp

      Filesize

      40KB

    • memory/5016-4-0x00000000050A0000-0x0000000005132000-memory.dmp

      Filesize

      584KB

    • memory/5016-3-0x0000000005650000-0x0000000005BF4000-memory.dmp

      Filesize

      5.6MB

    • memory/5016-2-0x0000000005000000-0x000000000509C000-memory.dmp

      Filesize

      624KB

    • memory/5016-1-0x00000000004A0000-0x0000000000610000-memory.dmp

      Filesize

      1.4MB