Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2024 00:23

General

  • Target

    88aa97175c6d55223e65e743be166f51_JaffaCakes118.exe

  • Size

    769KB

  • MD5

    88aa97175c6d55223e65e743be166f51

  • SHA1

    2923d1eacbdec6d2a3e92d096a40f6d59f290c5c

  • SHA256

    e5ffe75fc564d7a8aaabd188868910ddfc90cf64862f1af80a56c306e9b2e762

  • SHA512

    94217458b6fdecc84050e44118012ea0afbff6cb0abbe1efd2202e30e91f990deb04155d4679e32020965b6c41cd62bf6895f4abbaaa93f2333f154ddf460d1d

  • SSDEEP

    12288:OpmCnM2iNeHK7z+enElA8Jw8WBUm6eKJ3aMDD9/NKxR6hN4Yi6nP5sWZC1mwlLL:L4M1bCFhwEN5DNNKj6I+EllL

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

uecu

Decoy

ishtarhotel.com

woodstrends.icu

jalenowens.com

manno.expert

ssg1asia.com

telepathylaw.com

quickoprintnv.com

abrosnm3.com

lumberjackcatering.com

beachujamaica.com

thomasjeffersonbyrd.com

starryfinds.com

shelavish2.com

royalglamempirellc.com

deixandomeuemprego.com

alexgoestech.xyz

opticamn.com

fermanchevybrandon.com

milbodegas.info

adunarsrl.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\AppData\Local\Temp\88aa97175c6d55223e65e743be166f51_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\88aa97175c6d55223e65e743be166f51_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:376
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\SysWOW64\wscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/376-20-0x0000000000100000-0x0000000000110000-memory.dmp

    Filesize

    64KB

  • memory/376-17-0x00000000009C0000-0x0000000000CC3000-memory.dmp

    Filesize

    3.0MB

  • memory/376-15-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/376-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/376-9-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/376-10-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/376-19-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1064-24-0x0000000000070000-0x0000000000098000-memory.dmp

    Filesize

    160KB

  • memory/1064-22-0x0000000000960000-0x0000000000986000-memory.dmp

    Filesize

    152KB

  • memory/1064-23-0x0000000000960000-0x0000000000986000-memory.dmp

    Filesize

    152KB

  • memory/1160-25-0x0000000004F10000-0x0000000005019000-memory.dmp

    Filesize

    1.0MB

  • memory/1160-21-0x0000000004F10000-0x0000000005019000-memory.dmp

    Filesize

    1.0MB

  • memory/2760-6-0x0000000008170000-0x0000000008210000-memory.dmp

    Filesize

    640KB

  • memory/2760-3-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2760-4-0x000000007471E000-0x000000007471F000-memory.dmp

    Filesize

    4KB

  • memory/2760-0-0x000000007471E000-0x000000007471F000-memory.dmp

    Filesize

    4KB

  • memory/2760-2-0x0000000074710000-0x0000000074DFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2760-7-0x0000000002220000-0x000000000224E000-memory.dmp

    Filesize

    184KB

  • memory/2760-1-0x0000000000340000-0x0000000000406000-memory.dmp

    Filesize

    792KB

  • memory/2760-5-0x0000000074710000-0x0000000074DFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2760-16-0x0000000074710000-0x0000000074DFE000-memory.dmp

    Filesize

    6.9MB