Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 06:35

General

  • Target

    ea5a7ad0dcd55d7835d3649b9dfcd51e_JaffaCakes118.exe

  • Size

    398KB

  • MD5

    ea5a7ad0dcd55d7835d3649b9dfcd51e

  • SHA1

    cf6feba3fd6e5f0cf7cee84f4a216f33960e45db

  • SHA256

    0cb70c2842d361eff4d971e809911969086a71824cc422f98cbc8b924713463f

  • SHA512

    bff9e57c2344cf7e84e2545d8b5d82d16374eee9be5a705c0a6cb69979dbcb7c9a583b09799363f61362afa673d2c5a1180900222c84aaf2f5bca6f982218759

  • SSDEEP

    12288:5TIl1db2YCs2vycBplnjzafiyr3uLWgbROehqa:5Kbh1uVyr3bgACB

Malware Config

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3508
    • C:\Users\Admin\AppData\Local\Temp\ea5a7ad0dcd55d7835d3649b9dfcd51e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ea5a7ad0dcd55d7835d3649b9dfcd51e_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4944
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2468
      • C:\Users\Admin\AppData\Local\Temp\ea5a7ad0dcd55d7835d3649b9dfcd51e_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\ea5a7ad0dcd55d7835d3649b9dfcd51e_JaffaCakes118.exe
        3⤵
          PID:3976
        • C:\Users\Admin\AppData\Local\Temp\ea5a7ad0dcd55d7835d3649b9dfcd51e_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\ea5a7ad0dcd55d7835d3649b9dfcd51e_JaffaCakes118.exe
          3⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3496
          • C:\Users\Admin\AppData\Local\Temp\FB_A4A7.tmp.exe
            "C:\Users\Admin\AppData\Local\Temp\FB_A4A7.tmp.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:4772
          • C:\Users\Admin\AppData\Local\Temp\FB_A5E1.tmp.exe
            "C:\Users\Admin\AppData\Local\Temp\FB_A5E1.tmp.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:860
      • C:\Windows\SysWOW64\cmmon32.exe
        "C:\Windows\SysWOW64\cmmon32.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4692
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\FB_A4A7.tmp.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1140

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      0774a05ce5ee4c1af7097353c9296c62

      SHA1

      658ff96b111c21c39d7ad5f510fb72f9762114bb

      SHA256

      d9c5347ed06755feeb0615f1671f6b91e2718703da0dbc4b0bd205cbd2896dd4

      SHA512

      104d69fc4f4aaa5070b78ada130228939c7e01436351166fe51fe2da8a02f9948e6d92dd676f62820da1813872b91411e2f863c9a98a760581ec34d4aa354994

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      19KB

      MD5

      daf5f1fe246ac4092a26eaec49442e42

      SHA1

      4cf8819773ad138cb9c1298e8964e4d2001290f4

      SHA256

      87891a1df87d2df69b36e476867d87ad9ed7a5d08897ca740a076e1effca6c33

      SHA512

      8634558cc81783f626ad5967c1f2c9edbd9271ff114d6c23611f6b6b811cd32443bd8b8af7d56071dbdc27088f1f3cd35e17742a0a8706b9b8452776c91ca809

    • C:\Users\Admin\AppData\Local\Temp\FB_A4A7.tmp.exe

      Filesize

      161KB

      MD5

      16ee58ea30c5d2fe3e6cf3d92dcdfca4

      SHA1

      bcd3bc4aa0a78b174237399d1f700316f7fc7ccc

      SHA256

      f4d07db78b426427dd3ac873017a6d4be76d42d50ff082a2a9bc09948037a75e

      SHA512

      1a658c869cd7be561a7d245a887461a877b8ff06664a5518579f5346c8297935aa5bd4d7217c952aa0644fdf2b54321179903ae4f917bd32f213f77f728faa7c

    • C:\Users\Admin\AppData\Local\Temp\FB_A5E1.tmp.exe

      Filesize

      3KB

      MD5

      74bafb3e707c7b0c63938ac200f99c7f

      SHA1

      10c5506337845ed9bf25c73d2506f9c15ab8e608

      SHA256

      129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689

      SHA512

      5b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zkxuorts.mtp.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2468-51-0x0000000074940000-0x00000000750F0000-memory.dmp

      Filesize

      7.7MB

    • memory/2468-48-0x0000000006290000-0x00000000065E4000-memory.dmp

      Filesize

      3.3MB

    • memory/2468-38-0x0000000074940000-0x00000000750F0000-memory.dmp

      Filesize

      7.7MB

    • memory/2468-37-0x0000000074940000-0x00000000750F0000-memory.dmp

      Filesize

      7.7MB

    • memory/2468-36-0x0000000074940000-0x00000000750F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4180-83-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-79-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-1-0x00000000008F0000-0x000000000095A000-memory.dmp

      Filesize

      424KB

    • memory/4180-2-0x00000000058E0000-0x0000000005E84000-memory.dmp

      Filesize

      5.6MB

    • memory/4180-2179-0x0000000074940000-0x00000000750F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4180-54-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-55-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-77-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-97-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-113-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-57-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-59-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-63-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-33-0x000000007494E000-0x000000007494F000-memory.dmp

      Filesize

      4KB

    • memory/4180-34-0x0000000074940000-0x00000000750F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4180-65-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-69-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-71-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-73-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-5-0x00000000054C0000-0x00000000054CA000-memory.dmp

      Filesize

      40KB

    • memory/4180-4-0x0000000074940000-0x00000000750F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4180-3-0x0000000005330000-0x00000000053C2000-memory.dmp

      Filesize

      584KB

    • memory/4180-52-0x0000000006500000-0x0000000006560000-memory.dmp

      Filesize

      384KB

    • memory/4180-53-0x0000000006560000-0x00000000065CE000-memory.dmp

      Filesize

      440KB

    • memory/4180-61-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-67-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-117-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-115-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-111-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-109-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-107-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-105-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-103-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-101-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-99-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-95-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-93-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-91-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-89-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-87-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-85-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-0-0x000000007494E000-0x000000007494F000-memory.dmp

      Filesize

      4KB

    • memory/4180-81-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4180-75-0x0000000006560000-0x00000000065C8000-memory.dmp

      Filesize

      416KB

    • memory/4944-27-0x00000000066F0000-0x000000000670A000-memory.dmp

      Filesize

      104KB

    • memory/4944-29-0x0000000008650000-0x0000000008CCA000-memory.dmp

      Filesize

      6.5MB

    • memory/4944-7-0x0000000074940000-0x00000000750F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4944-8-0x0000000074940000-0x00000000750F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4944-11-0x0000000005250000-0x0000000005272000-memory.dmp

      Filesize

      136KB

    • memory/4944-32-0x0000000074940000-0x00000000750F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4944-6-0x00000000028D0000-0x0000000002906000-memory.dmp

      Filesize

      216KB

    • memory/4944-28-0x0000000006760000-0x0000000006782000-memory.dmp

      Filesize

      136KB

    • memory/4944-10-0x0000000074940000-0x00000000750F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4944-26-0x00000000071D0000-0x0000000007266000-memory.dmp

      Filesize

      600KB

    • memory/4944-25-0x0000000006590000-0x00000000065DC000-memory.dmp

      Filesize

      304KB

    • memory/4944-24-0x0000000006210000-0x000000000622E000-memory.dmp

      Filesize

      120KB

    • memory/4944-19-0x0000000005CA0000-0x0000000005FF4000-memory.dmp

      Filesize

      3.3MB

    • memory/4944-9-0x0000000005570000-0x0000000005B98000-memory.dmp

      Filesize

      6.2MB

    • memory/4944-13-0x0000000005410000-0x0000000005476000-memory.dmp

      Filesize

      408KB

    • memory/4944-12-0x00000000052F0000-0x0000000005356000-memory.dmp

      Filesize

      408KB