Analysis

  • max time kernel
    147s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-11-2024 01:20

General

  • Target

    8e71e9516683fb3becd0c6cdf5a9fa64_JaffaCakes118.exe

  • Size

    419KB

  • MD5

    8e71e9516683fb3becd0c6cdf5a9fa64

  • SHA1

    1f4aa8b7878e19c26e11a9001021975f5c2adca0

  • SHA256

    adfc1312ed080bcd3fff720269f3c544b5f33194acb71f36b2393d85eeedc34a

  • SHA512

    fa130c1e05c5a438dc5b8081d409d377298603e95a33f946460fbb3e0c88e824c49b02a06f6f11d19d9736eb6e728f79aa8542f3ef27962d24911c2182c465c8

  • SSDEEP

    12288:AH3sPiRmMzP7J55msJ/yU43aOBxijnKtpqRRrrOXpr:Y31mMRXh/yxqOBkj4qRRr6XJ

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

ur5u

Decoy

365happyday.xyz

maxiemier.info

desarapen.com

manjalmatrimony.com

developingservice.com

cxdnl.com

srlwujbj.icu

couldve-wouldve-shouldve.com

cruzingtovazquez.com

nishifleurs.com

ssgasi9a.com

jiantxcallbackc.com

myonlineslotsfree.com

kiahhco.com

extra-times.net

tvfenxiang.com

fluid-branding.com

esquire-capital.com

arvictories.com

energyvibrance.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\8e71e9516683fb3becd0c6cdf5a9fa64_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\8e71e9516683fb3becd0c6cdf5a9fa64_JaffaCakes118.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:392
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2144
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2880
      • C:\Users\Admin\AppData\Local\Temp\8e71e9516683fb3becd0c6cdf5a9fa64_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\8e71e9516683fb3becd0c6cdf5a9fa64_JaffaCakes118.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:11568
        • C:\Users\Admin\AppData\Local\Temp\FB_1E88.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\FB_1E88.tmp.exe"
          4⤵
          • Executes dropped EXE
          PID:11656
        • C:\Users\Admin\AppData\Local\Temp\FB_1F06.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\FB_1F06.tmp.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:11708
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:11760
      • C:\Windows\SysWOW64\cmstp.exe
        "C:\Windows\SysWOW64\cmstp.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:11768
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\FB_1F06.tmp.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:11800

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      7253ff8986c27fae9d4361c7d232fbfb

      SHA1

      cc63dd85a9a98d538c614b8fcac3718f7c11e38e

      SHA256

      d852a8e1447eadf4159144349415c97dfc2e962c2174afa4f67e678880dc76cd

      SHA512

      b1f4f52cdfda51dd0942f6d162cabb5b8f64b1b7b69fcb93e1c55bde6ce8110e294d412995e3da3e131856ad8f4b50b258ea93a17e13070f49a0ca5c12b66d0f

    • \Users\Admin\AppData\Local\Temp\FB_1E88.tmp.exe

      Filesize

      3KB

      MD5

      74bafb3e707c7b0c63938ac200f99c7f

      SHA1

      10c5506337845ed9bf25c73d2506f9c15ab8e608

      SHA256

      129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689

      SHA512

      5b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781

    • \Users\Admin\AppData\Local\Temp\FB_1F06.tmp.exe

      Filesize

      160KB

      MD5

      9a16e9de4753006240a630ca88e9af60

      SHA1

      78e41c0c0d8ed37c5018dcc881098d9202b9e0fc

      SHA256

      9bf97a6daa7f08db1da32ed7e6d1f925b0aaa9ed68594411ea75fe850a0b9ca6

      SHA512

      2b16bede0730975a77225f4d768444879e52584f043f1ac6ad907e99b86062efa4125eb69269e0843a9567f65d4a680c5135c847da2909a13d9e81ba046afd5f

    • memory/392-55-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-8-0x00000000744A0000-0x0000000074B8E000-memory.dmp

      Filesize

      6.9MB

    • memory/392-7-0x00000000744AE000-0x00000000744AF000-memory.dmp

      Filesize

      4KB

    • memory/392-51-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-2484-0x00000000744A0000-0x0000000074B8E000-memory.dmp

      Filesize

      6.9MB

    • memory/392-14-0x0000000005180000-0x00000000051E6000-memory.dmp

      Filesize

      408KB

    • memory/392-15-0x00000000051F0000-0x000000000526C000-memory.dmp

      Filesize

      496KB

    • memory/392-65-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-71-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-79-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-77-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-75-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-69-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-67-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-73-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-49-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-61-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-59-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-57-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-0-0x00000000744AE000-0x00000000744AF000-memory.dmp

      Filesize

      4KB

    • memory/392-1-0x0000000000B90000-0x0000000000C00000-memory.dmp

      Filesize

      448KB

    • memory/392-53-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-63-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-47-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-45-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-43-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-41-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-39-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-37-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-35-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-33-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-31-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-29-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-27-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-25-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-23-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-21-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-19-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-17-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-16-0x00000000051F0000-0x0000000005265000-memory.dmp

      Filesize

      468KB

    • memory/392-2-0x00000000744A0000-0x0000000074B8E000-memory.dmp

      Filesize

      6.9MB

    • memory/2144-6-0x0000000001DC0000-0x0000000001E00000-memory.dmp

      Filesize

      256KB

    • memory/2144-5-0x0000000001DC0000-0x0000000001E00000-memory.dmp

      Filesize

      256KB