Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2024 06:41

General

  • Target

    4650af5882a76acbb99b4545b37bd54d_JaffaCakes118.exe

  • Size

    481KB

  • MD5

    4650af5882a76acbb99b4545b37bd54d

  • SHA1

    86aa307ba05607db60f0f43eb9094a04a9e89454

  • SHA256

    c7151fd1d673aaf17c560cf8156f1bf3e6a909bd4a3ac4307edc25fa3bc04b42

  • SHA512

    4d7c35708ef6aaaddb76008e64c56f973214956b920a4d1f8b4818a0d0f85f91e22e35c378fc42f1066f215eb2a79e3beea69559b047401217de4c27a9f94c36

  • SSDEEP

    12288:c+mJL0S8rKgcZrFx4Oi5kThktSlkY9PT/nMmR:YXlHx4Oi5kThktSlkY9TnvR

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

qs23

Decoy

alimentosafc.com

noveltyporpak.xyz

fleteszoom.com

crabcompanions.com

metumuskfinance.com

perfectwatch.store

thweddingstory.com

ameliasongsforever.com

enowrecords.com

mywebcrown.com

silianceconseil.com

moodoven.com

generalwholesalestore.com

laguiza.com

gionakpil.com

nftfreemarket.com

astrainconsultora.com

favoritepedia.com

mycprguru.com

estateadmin.services

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4650af5882a76acbb99b4545b37bd54d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4650af5882a76acbb99b4545b37bd54d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\4650af5882a76acbb99b4545b37bd54d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\4650af5882a76acbb99b4545b37bd54d_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1732-0-0x000000007406E000-0x000000007406F000-memory.dmp

    Filesize

    4KB

  • memory/1732-1-0x0000000000B40000-0x0000000000BBE000-memory.dmp

    Filesize

    504KB

  • memory/1732-2-0x0000000074060000-0x000000007474E000-memory.dmp

    Filesize

    6.9MB

  • memory/1732-3-0x0000000074060000-0x000000007474E000-memory.dmp

    Filesize

    6.9MB

  • memory/2760-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2760-6-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2760-4-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2760-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2760-11-0x0000000000BC0000-0x0000000000EC3000-memory.dmp

    Filesize

    3.0MB