Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 10:42

General

  • Target

    9426dc9b8f72f909b3942db6eb186f5d_JaffaCakes118.exe

  • Size

    894KB

  • MD5

    9426dc9b8f72f909b3942db6eb186f5d

  • SHA1

    7c95adf813aca090d9df767830885e1af8fb5d7e

  • SHA256

    7c071823d86f7f37eb038add1e274db23c722612d74602e11496d0b4e312103a

  • SHA512

    169b0f951c40c696d7e696ddf473d8a019765e40eabb90b3c6183c4e761d8fdaddf1ec18e4f84a50a9396da53c298958ead92e8fc4135cdb07f45ce87d3d362c

  • SSDEEP

    12288:4se2d4V/0GzmvnITzhgb7ef8M+w8z/FCnkEFKvFxO6zHK7zQWzKboZT0FR:/HSd6Y87w8DFCkPvFxO6+U0KboyR

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

m6b5

Decoy

ixtarbelize.com

pheamal.com

daiyncc.com

staydoubted.com

laagerlitigation.club

sukrantastansakarya.com

esupport.ltd

vetscontracting.net

themuslimlife.coach

salmanairs.com

somatictherapyservices.com

lastminuteminister.com

comunicarbuenosaires.com

kazuya.tech

insightlyservicedev.com

redevelopment38subhashnagar.com

thefutureinvestor.com

simplysu.com

lagu45.com

livingstonpistolpermit.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\9426dc9b8f72f909b3942db6eb186f5d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\9426dc9b8f72f909b3942db6eb186f5d_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2440
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1200-22-0x0000000007860000-0x0000000007A01000-memory.dmp

    Filesize

    1.6MB

  • memory/1200-18-0x0000000007860000-0x0000000007A01000-memory.dmp

    Filesize

    1.6MB

  • memory/1860-13-0x0000000074CA0000-0x000000007538E000-memory.dmp

    Filesize

    6.9MB

  • memory/1860-1-0x0000000000D10000-0x0000000000DF4000-memory.dmp

    Filesize

    912KB

  • memory/1860-2-0x0000000074CA0000-0x000000007538E000-memory.dmp

    Filesize

    6.9MB

  • memory/1860-3-0x0000000000320000-0x0000000000336000-memory.dmp

    Filesize

    88KB

  • memory/1860-4-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

    Filesize

    4KB

  • memory/1860-5-0x0000000074CA0000-0x000000007538E000-memory.dmp

    Filesize

    6.9MB

  • memory/1860-6-0x00000000057F0000-0x000000000588E000-memory.dmp

    Filesize

    632KB

  • memory/1860-7-0x0000000000B20000-0x0000000000B4E000-memory.dmp

    Filesize

    184KB

  • memory/1860-0-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

    Filesize

    4KB

  • memory/2440-12-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2440-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2440-14-0x00000000008E0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.0MB

  • memory/2440-17-0x00000000000D0000-0x00000000000E0000-memory.dmp

    Filesize

    64KB

  • memory/2440-16-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2440-9-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2440-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2476-19-0x00000000007B0000-0x00000000007CC000-memory.dmp

    Filesize

    112KB

  • memory/2476-20-0x00000000007B0000-0x00000000007CC000-memory.dmp

    Filesize

    112KB

  • memory/2476-21-0x0000000000080000-0x00000000000A9000-memory.dmp

    Filesize

    164KB