Analysis

  • max time kernel
    94s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 14:34

General

  • Target

    da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe

  • Size

    930KB

  • MD5

    da18fea88d35935c34972c6d2b532b4b

  • SHA1

    5a0ceab83814ba09cf47eb32daf44651ac17cd61

  • SHA256

    8c200639871626b76bf9c568cbb456a304730cffb072dbf8ae36df19db96ed05

  • SHA512

    0c4ad8744a98cea89d103a9563e8c5875380467e9ce2472f4a81b67d3ec587840f3f70d006da70d6021bcc5c27f9815782186e0b9aa4d37fb762e08df877c89a

  • SSDEEP

    12288:WZ3iF2iNeHK7zgzdQ8EjcqwqeXp+LUVxN3XYPCbzIziUV9ZRLsa3pEP7r9r/+pph:63a1bYEjpUg2tXuCbzCV7361q

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

xcw2

Decoy

expdallastx.com

vedanshhomoeopathy.com

ssmt66.com

echomc.xyz

myclarityplanner.com

abrosnm3.com

unitandrea.icu

dftuned.com

sbamilkingmachinery.com

lifesongmidwife.com

crepkonnect.com

reevoy.info

warisanoranglama.com

geotekmapping.com

eert.net

pcmajstor.com

32sj6dxrkx8pfp.xyz

zoomaconsultation.com

vinilikes.com

superbrandsstore.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Users\Admin\AppData\Local\Temp\da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\da18fea88d35935c34972c6d2b532b4b_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/548-13-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/548-16-0x00000000012F0000-0x000000000163A000-memory.dmp

    Filesize

    3.3MB

  • memory/4740-8-0x0000000007D30000-0x0000000007D46000-memory.dmp

    Filesize

    88KB

  • memory/4740-9-0x00000000746DE000-0x00000000746DF000-memory.dmp

    Filesize

    4KB

  • memory/4740-4-0x0000000004EE0000-0x0000000004F72000-memory.dmp

    Filesize

    584KB

  • memory/4740-5-0x0000000004E20000-0x0000000004E2A000-memory.dmp

    Filesize

    40KB

  • memory/4740-6-0x0000000005120000-0x0000000005176000-memory.dmp

    Filesize

    344KB

  • memory/4740-7-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/4740-0-0x00000000746DE000-0x00000000746DF000-memory.dmp

    Filesize

    4KB

  • memory/4740-3-0x0000000005490000-0x0000000005A34000-memory.dmp

    Filesize

    5.6MB

  • memory/4740-10-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/4740-11-0x0000000008220000-0x00000000082BE000-memory.dmp

    Filesize

    632KB

  • memory/4740-12-0x000000000AA90000-0x000000000AABE000-memory.dmp

    Filesize

    184KB

  • memory/4740-2-0x0000000004E40000-0x0000000004EDC000-memory.dmp

    Filesize

    624KB

  • memory/4740-15-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/4740-1-0x0000000000390000-0x000000000047E000-memory.dmp

    Filesize

    952KB