Analysis

  • max time kernel
    33s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2024 17:37

General

  • Target

    3605e9de6e1e1b63ce9c4b6b25e4bce2_JaffaCakes118.exe

  • Size

    467KB

  • MD5

    3605e9de6e1e1b63ce9c4b6b25e4bce2

  • SHA1

    415604ecf117acd31735592e1450c72baa1344c9

  • SHA256

    b49d507a9840371642282e2d4a6b878f01a47265ece636e9380c7a4682a9c46a

  • SHA512

    d728bc59a94680ae280f03a92f129551a83fba2ac4ab384e8cb155068157c5b3149bb8127a7fe11b4bbb68f7617fb5c9484e6093c8b185bb853f311d53adef28

  • SSDEEP

    6144:807O/lGq3T7SzJqq4OoAqYwLw7puaP+Xoc52XEGafCLvIdn1f0SQddTZTbxpWMAE:TjYT7A4soCx2YrUVUvIdn6dTVW

Malware Config

Extracted

Family

xloader

Version

2.4

Campaign

cxeo

Decoy

realtyfindr.com

littlelakesranchcattle.com

mortgagecollective.online

cortenlogistic.com

healthcaresupplyinc.com

abc1229.com

johnlambertsen.online

yasirweb.tech

1398toftsdr.com

chordsofdevils.com

hemetcondos4sale.com

hdtvstoreonline.com

ultimasnoticiaswfmajide2.xyz

soutu6.com

lastmilefast.com

glveye.icu

countinesices.com

savenroar.com

reiwa.cloud

wendsoue.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3605e9de6e1e1b63ce9c4b6b25e4bce2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3605e9de6e1e1b63ce9c4b6b25e4bce2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\3605e9de6e1e1b63ce9c4b6b25e4bce2_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3605e9de6e1e1b63ce9c4b6b25e4bce2_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2336-6-0x0000000004F80000-0x0000000004FE4000-memory.dmp

    Filesize

    400KB

  • memory/2336-0-0x000000007497E000-0x000000007497F000-memory.dmp

    Filesize

    4KB

  • memory/2336-2-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/2336-3-0x0000000000530000-0x000000000053C000-memory.dmp

    Filesize

    48KB

  • memory/2336-4-0x000000007497E000-0x000000007497F000-memory.dmp

    Filesize

    4KB

  • memory/2336-5-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/2336-1-0x0000000000E80000-0x0000000000EFC000-memory.dmp

    Filesize

    496KB

  • memory/2336-7-0x0000000004350000-0x0000000004380000-memory.dmp

    Filesize

    192KB

  • memory/2336-15-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/2868-14-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2868-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2868-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2868-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2868-16-0x00000000008B0000-0x0000000000BB3000-memory.dmp

    Filesize

    3.0MB