Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 01:20

General

  • Target

    8e71e9516683fb3becd0c6cdf5a9fa64_JaffaCakes118.exe

  • Size

    419KB

  • MD5

    8e71e9516683fb3becd0c6cdf5a9fa64

  • SHA1

    1f4aa8b7878e19c26e11a9001021975f5c2adca0

  • SHA256

    adfc1312ed080bcd3fff720269f3c544b5f33194acb71f36b2393d85eeedc34a

  • SHA512

    fa130c1e05c5a438dc5b8081d409d377298603e95a33f946460fbb3e0c88e824c49b02a06f6f11d19d9736eb6e728f79aa8542f3ef27962d24911c2182c465c8

  • SSDEEP

    12288:AH3sPiRmMzP7J55msJ/yU43aOBxijnKtpqRRrrOXpr:Y31mMRXh/yxqOBkj4qRRr6XJ

Malware Config

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3500
    • C:\Users\Admin\AppData\Local\Temp\8e71e9516683fb3becd0c6cdf5a9fa64_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\8e71e9516683fb3becd0c6cdf5a9fa64_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:460
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1936
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4160
      • C:\Users\Admin\AppData\Local\Temp\8e71e9516683fb3becd0c6cdf5a9fa64_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\8e71e9516683fb3becd0c6cdf5a9fa64_JaffaCakes118.exe
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3672
        • C:\Users\Admin\AppData\Local\Temp\FB_AD91.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\FB_AD91.tmp.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3120
        • C:\Users\Admin\AppData\Local\Temp\FB_AF37.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\FB_AF37.tmp.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:60
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:5488
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\FB_AF37.tmp.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    0774a05ce5ee4c1af7097353c9296c62

    SHA1

    658ff96b111c21c39d7ad5f510fb72f9762114bb

    SHA256

    d9c5347ed06755feeb0615f1671f6b91e2718703da0dbc4b0bd205cbd2896dd4

    SHA512

    104d69fc4f4aaa5070b78ada130228939c7e01436351166fe51fe2da8a02f9948e6d92dd676f62820da1813872b91411e2f863c9a98a760581ec34d4aa354994

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    19KB

    MD5

    45f3aed96708bf443e4662fdf3cae213

    SHA1

    418f6e4b59efa8ac8f48368733eafa02c0232847

    SHA256

    917367cb28bf9510c199096f889e26ad627eca4f22d12d204fd499de6f090809

    SHA512

    5d6d55946b6e2e76d8ef744b2dcd54fd8cc7df9dd60179ac08f73b49a1a1e950c8bfcd37dd9475d9c7561070b1c15b03f9a99a7f9e751cb420574d64cb863691

  • C:\Users\Admin\AppData\Local\Temp\FB_AD91.tmp.exe

    Filesize

    3KB

    MD5

    74bafb3e707c7b0c63938ac200f99c7f

    SHA1

    10c5506337845ed9bf25c73d2506f9c15ab8e608

    SHA256

    129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689

    SHA512

    5b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781

  • C:\Users\Admin\AppData\Local\Temp\FB_AF37.tmp.exe

    Filesize

    160KB

    MD5

    9a16e9de4753006240a630ca88e9af60

    SHA1

    78e41c0c0d8ed37c5018dcc881098d9202b9e0fc

    SHA256

    9bf97a6daa7f08db1da32ed7e6d1f925b0aaa9ed68594411ea75fe850a0b9ca6

    SHA512

    2b16bede0730975a77225f4d768444879e52584f043f1ac6ad907e99b86062efa4125eb69269e0843a9567f65d4a680c5135c847da2909a13d9e81ba046afd5f

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xqtevmu1.onn.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/460-99-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-88-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-1-0x0000000000C20000-0x0000000000C90000-memory.dmp

    Filesize

    448KB

  • memory/460-2-0x00000000059F0000-0x0000000005F94000-memory.dmp

    Filesize

    5.6MB

  • memory/460-2495-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/460-59-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-67-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-69-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-71-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-5-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/460-73-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-75-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-77-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-107-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-80-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-81-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-83-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-30-0x00000000747DE000-0x00000000747DF000-memory.dmp

    Filesize

    4KB

  • memory/460-85-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-34-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/460-4-0x0000000005510000-0x000000000551A000-memory.dmp

    Filesize

    40KB

  • memory/460-103-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-89-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-91-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-95-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-57-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-97-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-52-0x0000000006810000-0x0000000006876000-memory.dmp

    Filesize

    408KB

  • memory/460-53-0x00000000073C0000-0x000000000743C000-memory.dmp

    Filesize

    496KB

  • memory/460-65-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-63-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-61-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-0-0x00000000747DE000-0x00000000747DF000-memory.dmp

    Filesize

    4KB

  • memory/460-102-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-3-0x0000000005520000-0x00000000055B2000-memory.dmp

    Filesize

    584KB

  • memory/460-93-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-55-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-54-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-117-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-115-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-113-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-111-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-109-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/460-105-0x00000000073C0000-0x0000000007435000-memory.dmp

    Filesize

    468KB

  • memory/1936-29-0x0000000008360000-0x00000000089DA000-memory.dmp

    Filesize

    6.5MB

  • memory/1936-12-0x0000000005AB0000-0x0000000005B16000-memory.dmp

    Filesize

    408KB

  • memory/1936-10-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/1936-7-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/1936-8-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/1936-9-0x00000000053D0000-0x00000000059F8000-memory.dmp

    Filesize

    6.2MB

  • memory/1936-11-0x00000000052E0000-0x0000000005302000-memory.dmp

    Filesize

    136KB

  • memory/1936-26-0x0000000006700000-0x0000000006796000-memory.dmp

    Filesize

    600KB

  • memory/1936-33-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/1936-6-0x0000000002890000-0x00000000028C6000-memory.dmp

    Filesize

    216KB

  • memory/1936-28-0x00000000066D0000-0x00000000066F2000-memory.dmp

    Filesize

    136KB

  • memory/1936-27-0x0000000006680000-0x000000000669A000-memory.dmp

    Filesize

    104KB

  • memory/1936-25-0x0000000006230000-0x000000000627C000-memory.dmp

    Filesize

    304KB

  • memory/1936-24-0x00000000061A0000-0x00000000061BE000-memory.dmp

    Filesize

    120KB

  • memory/1936-19-0x0000000005B90000-0x0000000005EE4000-memory.dmp

    Filesize

    3.3MB

  • memory/1936-13-0x0000000005B20000-0x0000000005B86000-memory.dmp

    Filesize

    408KB

  • memory/4160-36-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/4160-37-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/4160-38-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/4160-48-0x0000000005F70000-0x00000000062C4000-memory.dmp

    Filesize

    3.3MB

  • memory/4160-51-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB