Analysis

  • max time kernel
    96s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 03:38

General

  • Target

    c0a2a0aceaf14e6c168accbd44c6a583_JaffaCakes118.exe

  • Size

    679KB

  • MD5

    c0a2a0aceaf14e6c168accbd44c6a583

  • SHA1

    b97de15dcacda937581b607aff0b65f703cf063a

  • SHA256

    f0f020c489ae8bad33cee5f66c276f1a40dd9aff5eff55648922de36da0e233c

  • SHA512

    ffe70e0a7cb14a2a0df313da77751dfd760d211097f3d6f966fdeda3ce222c8bd43aae9e77a431370f75ea48770280ebbf446972a8a69532a1315787016583f4

  • SSDEEP

    12288:1bQ+X8+UiDLbRHahDU1Q3ZC2csPS2FQzab85LabwSdpmSqYeo+fuDJaKU2of:1bQ+X8+UiDLbRHahDUm3ZC+PTFQ2bkS

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

wdc8

Decoy

qiklanka.com

creativechaos520.com

parentsfuid.com

phenyx.education

raisinglittlejoeys.com

gazalvet.com

xymton.com

yavstore.com

khnfcl.net

amarillodefenseattorney.com

pnsp3.xyz

dolletecarter.com

didong247.net

eaujeunetuesunique.com

ivoireshoping.com

insurancewineappraisals.com

buyidh.xyz

kpfoundationinc.com

glow49.com

discountchristmas.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0a2a0aceaf14e6c168accbd44c6a583_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c0a2a0aceaf14e6c168accbd44c6a583_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\c0a2a0aceaf14e6c168accbd44c6a583_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c0a2a0aceaf14e6c168accbd44c6a583_JaffaCakes118.exe"
      2⤵
        PID:4520
      • C:\Users\Admin\AppData\Local\Temp\c0a2a0aceaf14e6c168accbd44c6a583_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\c0a2a0aceaf14e6c168accbd44c6a583_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4968

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3520-8-0x0000000074A6E000-0x0000000074A6F000-memory.dmp

      Filesize

      4KB

    • memory/3520-6-0x0000000004E40000-0x0000000004EDC000-memory.dmp

      Filesize

      624KB

    • memory/3520-2-0x0000000005070000-0x0000000005614000-memory.dmp

      Filesize

      5.6MB

    • memory/3520-3-0x0000000004BC0000-0x0000000004C52000-memory.dmp

      Filesize

      584KB

    • memory/3520-0-0x0000000074A6E000-0x0000000074A6F000-memory.dmp

      Filesize

      4KB

    • memory/3520-5-0x0000000004C80000-0x0000000004C8A000-memory.dmp

      Filesize

      40KB

    • memory/3520-1-0x0000000000170000-0x0000000000220000-memory.dmp

      Filesize

      704KB

    • memory/3520-7-0x0000000004CA0000-0x0000000004CBA000-memory.dmp

      Filesize

      104KB

    • memory/3520-4-0x0000000074A60000-0x0000000075210000-memory.dmp

      Filesize

      7.7MB

    • memory/3520-9-0x0000000074A60000-0x0000000075210000-memory.dmp

      Filesize

      7.7MB

    • memory/3520-10-0x0000000005B00000-0x0000000005B70000-memory.dmp

      Filesize

      448KB

    • memory/3520-11-0x0000000005B90000-0x0000000005B96000-memory.dmp

      Filesize

      24KB

    • memory/3520-12-0x0000000005BA0000-0x0000000005BDC000-memory.dmp

      Filesize

      240KB

    • memory/3520-15-0x0000000074A60000-0x0000000075210000-memory.dmp

      Filesize

      7.7MB

    • memory/4968-13-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/4968-16-0x00000000013B0000-0x00000000016FA000-memory.dmp

      Filesize

      3.3MB