Analysis

  • max time kernel
    140s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2024 17:02

General

  • Target

    52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe

  • Size

    844KB

  • MD5

    52bf72d40f8ecc722a7d8d6ae83ad2d9

  • SHA1

    cb2013d03a2bf04448b20a5a4aec0a8f979c8d9b

  • SHA256

    d2e29e115cef90f4158d21938c7458762bb01be720156a2f7c8bb8d021704fef

  • SHA512

    b35ff42e9fb56cedd485a0d307a59b4b4568ef9b04f8f4346fe8100becd9604d0e3ea1bb2764f017ef88834d24649ecb93afc8fd653469887f0731c2b0998474

  • SSDEEP

    12288:x1kMHia17eHK7zvdqcFhPfmUxYXNUuki1qcbJdwd2/a:qcTdqMVfd2XNZLbJWES

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

uqf5

Decoy

suiddock.com

sweetgyalshop.com

puterigarden.com

orangestoreusa.com

prostirkarpat.com

ajierfoods.com

mindlablearning.com

factiive.net

beautifulbrokenhearts.com

direcionalreservapraca.com

tvhoki.com

themoderncoachinstitute.com

classactionwalgreens.com

haloog.com

sachinkaushik.com

daleearnhardtjrchevyvip.com

disconight.net

ocyslibes.icu

encounterfy.com

infamoudpapertrail.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe"
      2⤵
        PID:1896
      • C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe"
        2⤵
          PID:3040
        • C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2512

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1952-8-0x0000000006350000-0x0000000006366000-memory.dmp

        Filesize

        88KB

      • memory/1952-6-0x0000000005280000-0x00000000052D6000-memory.dmp

        Filesize

        344KB

      • memory/1952-2-0x0000000005050000-0x00000000050EC000-memory.dmp

        Filesize

        624KB

      • memory/1952-3-0x00000000056A0000-0x0000000005C44000-memory.dmp

        Filesize

        5.6MB

      • memory/1952-0-0x000000007474E000-0x000000007474F000-memory.dmp

        Filesize

        4KB

      • memory/1952-5-0x0000000004F90000-0x0000000004F9A000-memory.dmp

        Filesize

        40KB

      • memory/1952-1-0x00000000004F0000-0x00000000005CA000-memory.dmp

        Filesize

        872KB

      • memory/1952-7-0x0000000074740000-0x0000000074EF0000-memory.dmp

        Filesize

        7.7MB

      • memory/1952-4-0x00000000050F0000-0x0000000005182000-memory.dmp

        Filesize

        584KB

      • memory/1952-9-0x000000007474E000-0x000000007474F000-memory.dmp

        Filesize

        4KB

      • memory/1952-10-0x0000000074740000-0x0000000074EF0000-memory.dmp

        Filesize

        7.7MB

      • memory/1952-11-0x0000000006B40000-0x0000000006BDA000-memory.dmp

        Filesize

        616KB

      • memory/1952-12-0x0000000009190000-0x00000000091BE000-memory.dmp

        Filesize

        184KB

      • memory/1952-15-0x0000000074740000-0x0000000074EF0000-memory.dmp

        Filesize

        7.7MB

      • memory/2512-13-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/2512-16-0x0000000001390000-0x00000000016DA000-memory.dmp

        Filesize

        3.3MB