Analysis

  • max time kernel
    148s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    24-10-2024 14:19

General

  • Target

    7419a11c48f0ed31dc35a63d44f61392_JaffaCakes118.exe

  • Size

    913KB

  • MD5

    7419a11c48f0ed31dc35a63d44f61392

  • SHA1

    be4a8c7b4bd5232bdc4021215dab6140376ca26a

  • SHA256

    ccad88cfcaf9a2b65b29af3fe6b85559efe3ffcf032ada3919cfa656eef60e54

  • SHA512

    8f2e443c8846660f769d8fe5712279b4a0c5267e99df1f195cc6b87508a7dc93177f6965303a7b529068eff22711ce557e3eec62ddb0557eaeda4c5b5f490b3c

  • SSDEEP

    12288:w3LeA2Ei6hYnM2VBnQ1QB7g5r9B0hlskjES3bBzP5mWK1VU68YYi2tHK7zjzKbo0:2Lsyz+qQhgnWTdBzPUWQBp9zKbo0

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

w56m

Decoy

damai.zone

mywishbookweb.cloud

sandilakeclothing.bid

joysell.net

hackedwhores.com

sjdibang.com

memaquiahiga.com

bleeckerbobs.net

emmettthomas.com

thesheetz.com

mimik33.info

prettyprettybartending.com

3173596.com

shwangjia.com

sightuiop.com

tinnitusnow.online

mahadevexporters.com

cleaninglanarkshire.com

ibiaozhi.net

upinfame.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\7419a11c48f0ed31dc35a63d44f61392_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\7419a11c48f0ed31dc35a63d44f61392_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\achsLLSCRXvSN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp47AA.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2920
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2944
    • C:\Windows\SysWOW64\systray.exe
      "C:\Windows\SysWOW64\systray.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp47AA.tmp

    Filesize

    1KB

    MD5

    8bcb65b1815a0d0e4f40ca9cc438e2c5

    SHA1

    9b52053c4afe23f114f8945d9bc6479df55fd854

    SHA256

    c38e97e40503cd2e4ac538475de0a26fe7f74663ce4447d68effa8a0ee153b5f

    SHA512

    a5c9eee8768f3922b086a32347e020767800d3b59aae969436027bb5c073bcf872d2a09803b85d30a98ac9502dafc0daf275023357f477c57a554231c0b46af0

  • memory/1188-24-0x0000000000010000-0x0000000000020000-memory.dmp

    Filesize

    64KB

  • memory/1188-25-0x0000000005040000-0x00000000051C5000-memory.dmp

    Filesize

    1.5MB

  • memory/1188-29-0x0000000005040000-0x00000000051C5000-memory.dmp

    Filesize

    1.5MB

  • memory/1740-5-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/1740-1-0x0000000000F00000-0x0000000000FEA000-memory.dmp

    Filesize

    936KB

  • memory/1740-6-0x00000000057A0000-0x0000000005840000-memory.dmp

    Filesize

    640KB

  • memory/1740-2-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/1740-19-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/1740-7-0x00000000008B0000-0x00000000008DE000-memory.dmp

    Filesize

    184KB

  • memory/1740-0-0x00000000748AE000-0x00000000748AF000-memory.dmp

    Filesize

    4KB

  • memory/1740-4-0x00000000748AE000-0x00000000748AF000-memory.dmp

    Filesize

    4KB

  • memory/1740-3-0x0000000000300000-0x0000000000316000-memory.dmp

    Filesize

    88KB

  • memory/2068-27-0x0000000000E20000-0x0000000000E25000-memory.dmp

    Filesize

    20KB

  • memory/2068-28-0x0000000000080000-0x00000000000A9000-memory.dmp

    Filesize

    164KB

  • memory/2068-26-0x0000000000E20000-0x0000000000E25000-memory.dmp

    Filesize

    20KB

  • memory/2944-22-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2944-14-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2944-13-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2944-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2944-18-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2944-20-0x0000000000AE0000-0x0000000000DE3000-memory.dmp

    Filesize

    3.0MB

  • memory/2944-23-0x0000000000190000-0x00000000001A1000-memory.dmp

    Filesize

    68KB