Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 13:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/gjspvjmvb.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/gjspvjmvb.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/gjspvjmvb.dll
-
Size
21KB
-
MD5
cb5ae97fd494cd241495179668d3a3d2
-
SHA1
33e6282a11c9140860710cd4a251e428e5cb75b8
-
SHA256
2e31c7a695a70e216180fefa04ff81c8ad783b72b8d5fe40f506e00ada784f6f
-
SHA512
83d265679fcb712cb8810d9b24a68c2d952cdb00656464b3c52a34a9bac48a62d2ed26d82ff0837946876bc1d992796376703a394da4c451cae671a043f32f44
-
SSDEEP
384:aSpqwtpSNch8eco6p87VVV++jtFQmsDyPVyQYEJILzZcR:aSpptpVG8vVljI5DYiEJILzZk
Malware Config
Extracted
xloader
2.5
b65i
leofighters.com
smartat2.xyz
encontrevariedades.com
jimwilliamstutoring.com
kanpaiecuador.com
accura-inv.com
xtzgjxzz.com
scentstrategies.com
high-clicks2.com
hadishgebray.com
woodlawnbailbonds.com
dmsolutionsco.com
rdvulm21.com
beachyweens.com
ishirmansingh.com
rimmasbracelets.com
kellibrat.com
roselmasm.com
datkamoney.info
fermers.club
veytrex.com
bigfussblog.com
seehow3.com
howtosellhighticket.com
gv-china.com
midatlanticbaths.com
peoplexplants.com
xinhe138.com
peoplefirstflorida.com
lk-safe-keepingtoyof4.xyz
lavish-hika.com
thefooddrone.com
lowkeymastery.com
ferratahvar.com
ntgc.glass
ctfeldsine.com
131inwood.com
austinfishandchicken.com
adambridewell.com
starzara.com
pillfinancialliteracy.com
urlos.store
coralhide.com
y6pw.xyz
palazzoloan.com
peoplesadvantage.net
konzertmanagement.com
alphapat-sa.com
moresatisfy.club
sexynailcompany.com
janlgesnetwork.net
manifestingiam.com
vehicaldashino.com
jazminsalym.com
strtplay2day.info
insureagainstearthquake.com
sddn57.xyz
staygood.gmbh
paymentssecureweb.com
gee-law.com
tenloe098.xyz
mikevideodirection.online
povital.com
ktrtaiwan.com
onewebuy.net
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2164-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2164-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2012-9-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2556 set thread context of 2164 2556 rundll32.exe 31 PID 2164 set thread context of 1232 2164 rundll32.exe 21 PID 2012 set thread context of 1232 2012 ipconfig.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2012 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2164 rundll32.exe 2164 rundll32.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe 2012 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2164 rundll32.exe 2164 rundll32.exe 2164 rundll32.exe 2012 ipconfig.exe 2012 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2164 rundll32.exe Token: SeDebugPrivilege 2012 ipconfig.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2556 2168 rundll32.exe 30 PID 2168 wrote to memory of 2556 2168 rundll32.exe 30 PID 2168 wrote to memory of 2556 2168 rundll32.exe 30 PID 2168 wrote to memory of 2556 2168 rundll32.exe 30 PID 2168 wrote to memory of 2556 2168 rundll32.exe 30 PID 2168 wrote to memory of 2556 2168 rundll32.exe 30 PID 2168 wrote to memory of 2556 2168 rundll32.exe 30 PID 2556 wrote to memory of 2164 2556 rundll32.exe 31 PID 2556 wrote to memory of 2164 2556 rundll32.exe 31 PID 2556 wrote to memory of 2164 2556 rundll32.exe 31 PID 2556 wrote to memory of 2164 2556 rundll32.exe 31 PID 2556 wrote to memory of 2164 2556 rundll32.exe 31 PID 2556 wrote to memory of 2164 2556 rundll32.exe 31 PID 2556 wrote to memory of 2164 2556 rundll32.exe 31 PID 2556 wrote to memory of 2164 2556 rundll32.exe 31 PID 2556 wrote to memory of 2164 2556 rundll32.exe 31 PID 2556 wrote to memory of 2164 2556 rundll32.exe 31 PID 1232 wrote to memory of 2012 1232 Explorer.EXE 37 PID 1232 wrote to memory of 2012 1232 Explorer.EXE 37 PID 1232 wrote to memory of 2012 1232 Explorer.EXE 37 PID 1232 wrote to memory of 2012 1232 Explorer.EXE 37 PID 2012 wrote to memory of 2960 2012 ipconfig.exe 38 PID 2012 wrote to memory of 2960 2012 ipconfig.exe 38 PID 2012 wrote to memory of 2960 2012 ipconfig.exe 38 PID 2012 wrote to memory of 2960 2012 ipconfig.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gjspvjmvb.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gjspvjmvb.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gjspvjmvb.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2572
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2560
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1884
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2340
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1628
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-