Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 16:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2d0ac0a8f2d2aea1f05429585c1bdc4c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2d0ac0a8f2d2aea1f05429585c1bdc4c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/hkdklixzga.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/hkdklixzga.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/hkdklixzga.dll
-
Size
19KB
-
MD5
fe53df25d11886ebd5c24164328ca8bf
-
SHA1
3d051e82d0bd8bbd4c5647ab11a36e8fe0407631
-
SHA256
d3827d83d541e98cff0bb89a27c2db75e59b62ed57a934cc8c9e6a9623864716
-
SHA512
578a786ea59572ae33b245314493bfda501eadde6bfcad2e20fd45e39e7d2e6e237403ed912f38aebd3fa79c582f27e7846f0896e22e01d1e276abcb8b32eecc
-
SSDEEP
192:JPEvK1NldFntndU2KQb3s63lfap1J24HrrdbY2T2/pa7Na7x36Af6TdzFIiqsXQ/:xEC1rdFtdUsnap1o4HOXpa7hAClH4f
Malware Config
Extracted
xloader
2.5
u5eh
tryafaq.com
bobcathntshop.com
oglead.com
026skz.xyz
brasbux.com
adna17.com
noveltyrofjiy.xyz
realestatecompanys.com
leman-web.com
df5686.com
jonathonhawkins.com
juliedominyfloralartistry.com
classyeventsco.com
aquaticatt.com
iotworld.xyz
hoc8.com
disposablediapers.store
peregovorim.online
advancebits.club
getaburialplan.com
tiger-trails.com
dnbaba.com
492981.com
eclipse-electrical-euless.com
cassandracchase.com
healthrightmeds.club
permkray.club
tawazoun-dz.com
extrabladet.com
offmanage.com
peoplexplants.com
mumkungiyim.com
personal-email-office-mgt.com
bjmysa.com
hopshomes.com
cnj-power.com
trendproduct.tech
chauffeuredaustralia.online
176ssjp0033.xyz
52juns.com
rewriringcanada.com
seabourneboats.com
sevensummittrek.com
retalent.agency
lz4ios.cloud
mindandbodyalignment.com
bedrijfmail-trk.com
bashmoney.net
xc3654.com
infiteltech.com
sh-hywz.com
huataiqche.com
grannyh.com
devinwithani.com
kingstons.info
fakedocshyundaigiveaway.com
bigsyncmusic.info
predstavnuk.com
frontiervalley8.com
timdpr.com
smartgymadmin.com
brsgeniusschool.com
tuckertractorworks.com
espchange.com
retonamoss.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2312-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2312-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2080-10-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1416 set thread context of 2312 1416 rundll32.exe 32 PID 2312 set thread context of 1144 2312 rundll32.exe 20 PID 2080 set thread context of 1144 2080 cmstp.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2312 rundll32.exe 2312 rundll32.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe 2080 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2312 rundll32.exe 2312 rundll32.exe 2312 rundll32.exe 2080 cmstp.exe 2080 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2312 rundll32.exe Token: SeDebugPrivilege 2080 cmstp.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1416 2244 rundll32.exe 31 PID 2244 wrote to memory of 1416 2244 rundll32.exe 31 PID 2244 wrote to memory of 1416 2244 rundll32.exe 31 PID 2244 wrote to memory of 1416 2244 rundll32.exe 31 PID 2244 wrote to memory of 1416 2244 rundll32.exe 31 PID 2244 wrote to memory of 1416 2244 rundll32.exe 31 PID 2244 wrote to memory of 1416 2244 rundll32.exe 31 PID 1416 wrote to memory of 2312 1416 rundll32.exe 32 PID 1416 wrote to memory of 2312 1416 rundll32.exe 32 PID 1416 wrote to memory of 2312 1416 rundll32.exe 32 PID 1416 wrote to memory of 2312 1416 rundll32.exe 32 PID 1416 wrote to memory of 2312 1416 rundll32.exe 32 PID 1416 wrote to memory of 2312 1416 rundll32.exe 32 PID 1416 wrote to memory of 2312 1416 rundll32.exe 32 PID 1416 wrote to memory of 2312 1416 rundll32.exe 32 PID 1416 wrote to memory of 2312 1416 rundll32.exe 32 PID 1416 wrote to memory of 2312 1416 rundll32.exe 32 PID 1144 wrote to memory of 2080 1144 Explorer.EXE 33 PID 1144 wrote to memory of 2080 1144 Explorer.EXE 33 PID 1144 wrote to memory of 2080 1144 Explorer.EXE 33 PID 1144 wrote to memory of 2080 1144 Explorer.EXE 33 PID 1144 wrote to memory of 2080 1144 Explorer.EXE 33 PID 1144 wrote to memory of 2080 1144 Explorer.EXE 33 PID 1144 wrote to memory of 2080 1144 Explorer.EXE 33 PID 2080 wrote to memory of 1048 2080 cmstp.exe 34 PID 2080 wrote to memory of 1048 2080 cmstp.exe 34 PID 2080 wrote to memory of 1048 2080 cmstp.exe 34 PID 2080 wrote to memory of 1048 2080 cmstp.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hkdklixzga.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hkdklixzga.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hkdklixzga.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1048
-
-