Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 07:38

General

  • Target

    ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe

  • Size

    465KB

  • MD5

    ddafa2b44ec908b114a4c33431e0952a

  • SHA1

    e85c3f28cd859c6b5ab900c6a0c07a8fcfde8173

  • SHA256

    4ca6a48021d7d442d9311b158691b1f219576d7d37a99f64741463659903ad4c

  • SHA512

    4a3e227d44ad1cd9d6402e3bbde1ecc51196a7d8325f808bd6ba05059a6f596edf82f0ce2b359daa61267f6fcd08dc994549a6b06aec0cda1480ec14ab3efd87

  • SSDEEP

    6144:UEuRQAx7F0oJbIkfS6yLURmB2kC1iQvOhWfVqh9HZZzALTfj9H7C80kDq8a5O+F:Y+Ax7DJ69251VYWfVgH837e6AFzdp

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

weni

Decoy

sdmdwang.com

konversationswithkoshie.net

carap.club

eagldeream.com

856380585.xyz

elgallocoffee.com

magetu.info

lovertons.com

theichallenge.com

advancedautorepairsonline.com

wingsstyling.info

tapdaugusta.com

wiloasbanhsgtarewdasc.solutions

donjrisdumb.com

experienceddoctor.com

cloverhillconsultants.com

underwear.show

karensgonewild2020.com

arodsr.com

thefucktardmanual.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\AppData\Local\Temp\ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe
      "{path}"
      2⤵
        PID:3036
      • C:\Users\Admin\AppData\Local\Temp\ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe
        "{path}"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2824

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1648-6-0x0000000005150000-0x00000000051D2000-memory.dmp

      Filesize

      520KB

    • memory/1648-0-0x0000000074C3E000-0x0000000074C3F000-memory.dmp

      Filesize

      4KB

    • memory/1648-2-0x0000000074C30000-0x000000007531E000-memory.dmp

      Filesize

      6.9MB

    • memory/1648-3-0x0000000000920000-0x0000000000928000-memory.dmp

      Filesize

      32KB

    • memory/1648-4-0x0000000074C3E000-0x0000000074C3F000-memory.dmp

      Filesize

      4KB

    • memory/1648-5-0x0000000074C30000-0x000000007531E000-memory.dmp

      Filesize

      6.9MB

    • memory/1648-1-0x0000000000C30000-0x0000000000CAA000-memory.dmp

      Filesize

      488KB

    • memory/1648-7-0x0000000000B50000-0x0000000000B82000-memory.dmp

      Filesize

      200KB

    • memory/1648-16-0x0000000074C30000-0x000000007531E000-memory.dmp

      Filesize

      6.9MB

    • memory/2824-17-0x0000000000CB0000-0x0000000000FB3000-memory.dmp

      Filesize

      3.0MB

    • memory/2824-15-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2824-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2824-10-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2824-8-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB