Analysis

  • max time kernel
    148s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2024 01:20

General

  • Target

    aa71f2483d9c2e808cd3e3e56c2b463f_JaffaCakes118.exe

  • Size

    740KB

  • MD5

    aa71f2483d9c2e808cd3e3e56c2b463f

  • SHA1

    cd41370a62b7cab949c04fdcd6578438c410e7c2

  • SHA256

    1ad6352350f0b871f3757d1994aa42fee726cdca78834f743f09e8a15bfc3dd1

  • SHA512

    72d93357b75b7451719c4580fadd00a8885813b8b236fa1e3c4ea2692d516f1ba98f7b320256bf12fd7c5dc02240fe850552694f3aac36cd3facc9bbbb54d2f2

  • SSDEEP

    12288:sqnBhp+gczyhNSvRbBQHR4qz91hI0zSaNsvz+yuWDVId21NaI+E8tyvXck4xeLbf:sqnkCeLWgLX2UxEYTMcDz+BJmdcHlsIE

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

uecu

Decoy

ishtarhotel.com

woodstrends.icu

jalenowens.com

manno.expert

ssg1asia.com

telepathylaw.com

quickoprintnv.com

abrosnm3.com

lumberjackcatering.com

beachujamaica.com

thomasjeffersonbyrd.com

starryfinds.com

shelavish2.com

royalglamempirellc.com

deixandomeuemprego.com

alexgoestech.xyz

opticamn.com

fermanchevybrandon.com

milbodegas.info

adunarsrl.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\aa71f2483d9c2e808cd3e3e56c2b463f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\aa71f2483d9c2e808cd3e3e56c2b463f_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2064
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1236-18-0x00000000071C0000-0x0000000007309000-memory.dmp

    Filesize

    1.3MB

  • memory/1236-22-0x00000000071C0000-0x0000000007309000-memory.dmp

    Filesize

    1.3MB

  • memory/2064-16-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2064-14-0x00000000008A0000-0x0000000000BA3000-memory.dmp

    Filesize

    3.0MB

  • memory/2064-17-0x0000000000090000-0x00000000000A0000-memory.dmp

    Filesize

    64KB

  • memory/2064-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2064-9-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2064-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2064-12-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2408-21-0x0000000000080000-0x00000000000A8000-memory.dmp

    Filesize

    160KB

  • memory/2408-20-0x0000000000920000-0x0000000000938000-memory.dmp

    Filesize

    96KB

  • memory/2408-19-0x0000000000920000-0x0000000000938000-memory.dmp

    Filesize

    96KB

  • memory/2952-7-0x00000000048B0000-0x0000000004922000-memory.dmp

    Filesize

    456KB

  • memory/2952-13-0x0000000074430000-0x0000000074B1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2952-3-0x0000000000300000-0x0000000000308000-memory.dmp

    Filesize

    32KB

  • memory/2952-0-0x000000007443E000-0x000000007443F000-memory.dmp

    Filesize

    4KB

  • memory/2952-2-0x0000000074430000-0x0000000074B1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2952-6-0x0000000008020000-0x00000000080E2000-memory.dmp

    Filesize

    776KB

  • memory/2952-5-0x0000000074430000-0x0000000074B1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2952-4-0x000000007443E000-0x000000007443F000-memory.dmp

    Filesize

    4KB

  • memory/2952-1-0x0000000000220000-0x00000000002E0000-memory.dmp

    Filesize

    768KB