Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 17:02

General

  • Target

    52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe

  • Size

    844KB

  • MD5

    52bf72d40f8ecc722a7d8d6ae83ad2d9

  • SHA1

    cb2013d03a2bf04448b20a5a4aec0a8f979c8d9b

  • SHA256

    d2e29e115cef90f4158d21938c7458762bb01be720156a2f7c8bb8d021704fef

  • SHA512

    b35ff42e9fb56cedd485a0d307a59b4b4568ef9b04f8f4346fe8100becd9604d0e3ea1bb2764f017ef88834d24649ecb93afc8fd653469887f0731c2b0998474

  • SSDEEP

    12288:x1kMHia17eHK7zvdqcFhPfmUxYXNUuki1qcbJdwd2/a:qcTdqMVfd2XNZLbJWES

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

uqf5

Decoy

suiddock.com

sweetgyalshop.com

puterigarden.com

orangestoreusa.com

prostirkarpat.com

ajierfoods.com

mindlablearning.com

factiive.net

beautifulbrokenhearts.com

direcionalreservapraca.com

tvhoki.com

themoderncoachinstitute.com

classactionwalgreens.com

haloog.com

sachinkaushik.com

daleearnhardtjrchevyvip.com

disconight.net

ocyslibes.icu

encounterfy.com

infamoudpapertrail.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2476-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2476-14-0x0000000000AC0000-0x0000000000DC3000-memory.dmp

    Filesize

    3.0MB

  • memory/2476-9-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2476-12-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2476-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2556-3-0x0000000004210000-0x0000000004226000-memory.dmp

    Filesize

    88KB

  • memory/2556-6-0x0000000005860000-0x00000000058FA000-memory.dmp

    Filesize

    616KB

  • memory/2556-7-0x0000000004410000-0x000000000443E000-memory.dmp

    Filesize

    184KB

  • memory/2556-5-0x0000000073F50000-0x000000007463E000-memory.dmp

    Filesize

    6.9MB

  • memory/2556-4-0x0000000073F5E000-0x0000000073F5F000-memory.dmp

    Filesize

    4KB

  • memory/2556-0-0x0000000073F5E000-0x0000000073F5F000-memory.dmp

    Filesize

    4KB

  • memory/2556-2-0x0000000073F50000-0x000000007463E000-memory.dmp

    Filesize

    6.9MB

  • memory/2556-13-0x0000000073F50000-0x000000007463E000-memory.dmp

    Filesize

    6.9MB

  • memory/2556-1-0x00000000001B0000-0x000000000028A000-memory.dmp

    Filesize

    872KB