Analysis

  • max time kernel
    94s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 07:38

General

  • Target

    ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe

  • Size

    465KB

  • MD5

    ddafa2b44ec908b114a4c33431e0952a

  • SHA1

    e85c3f28cd859c6b5ab900c6a0c07a8fcfde8173

  • SHA256

    4ca6a48021d7d442d9311b158691b1f219576d7d37a99f64741463659903ad4c

  • SHA512

    4a3e227d44ad1cd9d6402e3bbde1ecc51196a7d8325f808bd6ba05059a6f596edf82f0ce2b359daa61267f6fcd08dc994549a6b06aec0cda1480ec14ab3efd87

  • SSDEEP

    6144:UEuRQAx7F0oJbIkfS6yLURmB2kC1iQvOhWfVqh9HZZzALTfj9H7C80kDq8a5O+F:Y+Ax7DJ69251VYWfVgH837e6AFzdp

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

weni

Decoy

sdmdwang.com

konversationswithkoshie.net

carap.club

eagldeream.com

856380585.xyz

elgallocoffee.com

magetu.info

lovertons.com

theichallenge.com

advancedautorepairsonline.com

wingsstyling.info

tapdaugusta.com

wiloasbanhsgtarewdasc.solutions

donjrisdumb.com

experienceddoctor.com

cloverhillconsultants.com

underwear.show

karensgonewild2020.com

arodsr.com

thefucktardmanual.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Users\Admin\AppData\Local\Temp\ddafa2b44ec908b114a4c33431e0952a_JaffaCakes118.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/348-12-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/348-14-0x00000000012D0000-0x000000000161A000-memory.dmp

    Filesize

    3.3MB

  • memory/384-6-0x0000000002D00000-0x0000000002D08000-memory.dmp

    Filesize

    32KB

  • memory/384-3-0x0000000005270000-0x0000000005302000-memory.dmp

    Filesize

    584KB

  • memory/384-4-0x0000000002CE0000-0x0000000002CEA000-memory.dmp

    Filesize

    40KB

  • memory/384-5-0x0000000074CB0000-0x0000000075460000-memory.dmp

    Filesize

    7.7MB

  • memory/384-0-0x0000000074CBE000-0x0000000074CBF000-memory.dmp

    Filesize

    4KB

  • memory/384-7-0x0000000006920000-0x00000000069BC000-memory.dmp

    Filesize

    624KB

  • memory/384-8-0x0000000074CBE000-0x0000000074CBF000-memory.dmp

    Filesize

    4KB

  • memory/384-9-0x0000000074CB0000-0x0000000075460000-memory.dmp

    Filesize

    7.7MB

  • memory/384-10-0x0000000006E80000-0x0000000006F02000-memory.dmp

    Filesize

    520KB

  • memory/384-11-0x0000000006D80000-0x0000000006DB2000-memory.dmp

    Filesize

    200KB

  • memory/384-2-0x0000000005A00000-0x0000000005FA4000-memory.dmp

    Filesize

    5.6MB

  • memory/384-1-0x0000000000810000-0x000000000088A000-memory.dmp

    Filesize

    488KB

  • memory/384-15-0x0000000074CB0000-0x0000000075460000-memory.dmp

    Filesize

    7.7MB