Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2024 17:50

General

  • Target

    638b6ebd151367c3edb3c71446f69dd7_JaffaCakes118.exe

  • Size

    832KB

  • MD5

    638b6ebd151367c3edb3c71446f69dd7

  • SHA1

    940e938809b6cef36948df102cb4304969c2f58a

  • SHA256

    fd151f1c914b41e565c1dfeae2cab5c77fdcc885b83c46e30b9fe3eefc68efd3

  • SHA512

    8b5ad4d87c24bde0685e6f458597a3bbf3df1892c6de08e22c66cc7f84ff650ab2e7917cc172f3fa85917578a28749b7c2ad844e80b2452ee35c0d13d242b6f9

  • SSDEEP

    12288:G49Q4FR9/HK7zPxQ9l2hZQ9ixuWFECiUnQ5np6m2s94pcwwsqO9gAAu8WP3YxAEq:9JFuNG2hHuwkUQ2m2s9qNqOfgW/

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

gno4

Decoy

callsecuritymusic.com

quikngo.com

gardenofbabyclothes.com

bailbondinculvercity.com

nqyaurlz.icu

sultanulhind.com

toddy-bodies.com

kom-hunter.com

theradibio.com

pageonefourplay.info

wildlifetools.com

nobleegoist.com

girlsjerkoff.com

theenlows.com

jyqcxl.com

southernbluebee.com

betfootballthaigold.com

remaxaffinityplus.net

teamlunsford.com

howtoberealonline.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\638b6ebd151367c3edb3c71446f69dd7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\638b6ebd151367c3edb3c71446f69dd7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\638b6ebd151367c3edb3c71446f69dd7_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\638b6ebd151367c3edb3c71446f69dd7_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2192-6-0x0000000005130000-0x00000000051CE000-memory.dmp

    Filesize

    632KB

  • memory/2192-0-0x00000000742BE000-0x00000000742BF000-memory.dmp

    Filesize

    4KB

  • memory/2192-2-0x00000000742B0000-0x000000007499E000-memory.dmp

    Filesize

    6.9MB

  • memory/2192-3-0x00000000007C0000-0x00000000007D6000-memory.dmp

    Filesize

    88KB

  • memory/2192-4-0x00000000742BE000-0x00000000742BF000-memory.dmp

    Filesize

    4KB

  • memory/2192-5-0x00000000742B0000-0x000000007499E000-memory.dmp

    Filesize

    6.9MB

  • memory/2192-1-0x0000000000010000-0x00000000000E6000-memory.dmp

    Filesize

    856KB

  • memory/2192-7-0x0000000001EE0000-0x0000000001F0E000-memory.dmp

    Filesize

    184KB

  • memory/2192-13-0x00000000742B0000-0x000000007499E000-memory.dmp

    Filesize

    6.9MB

  • memory/2632-12-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2632-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2632-9-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2632-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2632-14-0x0000000000970000-0x0000000000C73000-memory.dmp

    Filesize

    3.0MB