Analysis

  • max time kernel
    136s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 07:11

General

  • Target

    82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe

  • Size

    797KB

  • MD5

    82313d9072e776dcf2290245e35b2784

  • SHA1

    f58849871cc85d60cc49af4e37e1ae845648c9f5

  • SHA256

    f07e026ebe12f04343d27a35610cd195876501891518a005d64741402e7b4b8e

  • SHA512

    0a487ca070fbb65cfe0da5477d3fdb6eae767a0b55198e0e288bd5e824bcd01f6846c7e6dabb06a73b37d73749212533beaeaac05f98a6a3b6cc5354ab1ac93b

  • SSDEEP

    12288:8Zx7rMYV6MorX7qzuC3QHO9FQVHPF51jgctrcdX/xfLZ2YxfIxncr:8PBXu9HGaVHGxFt2dcr

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

wme0

Decoy

mobileads.network

smartplumbing.services

hessusmelke.quest

5gbusinessbestservices.com

soniceasy.com

sishikeji.com

streetstock.space

interchimp.com

sassholesentiments.com

lemon6.club

thestogiestore.com

11elevencouture.com

loveimperia.com

firstactrealestate.com

alstonimages.com

mainmanmemories.com

floridavillarealtor.com

selberherrlab.com

jurisfinca.quest

bakercsoncrete.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Users\Admin\AppData\Local\Temp\82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\82313d9072e776dcf2290245e35b2784_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/436-2-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB