Analysis
-
max time kernel
148s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 15:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_cc19c69f756ab25010c68a64b03f2eee.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/skjesair.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/skjesair.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/skjesair.dll
-
Size
38KB
-
MD5
f9099ad46c16a20b52f173f5806426bf
-
SHA1
b7543e7af6930e16520f41bc0c3e5fdd5f1ce45d
-
SHA256
e80f972bce5004dfe27ca8a8063f354be8b0b618119db1e706242d28217e02ca
-
SHA512
6d6c2aec061cdc3e34b7774e1a16971f246b79da659bc8140d0965130a54bf81f57ad50d56314b5b5f551eb1d24e15d2d6131e041665dc3ecb921af3a426cdc1
-
SSDEEP
768:JbqF9FSKFaJ7arlVhknrYOyW5XX+Jv+1:kLF5Hk3O41
Malware Config
Extracted
xloader
2.5
epz2
moslemco.com
besrbee.com
in-teh.com
fofomej.xyz
partner2form.com
codigocentro.com
thgn29.xyz
behindwp.com
oliviatevents.com
jammineugene.com
colobohieran.quest
freidenfelt.com
ribbitathleticwear.com
dreamlylife.com
hotelcxn.com
preciosaglass.com
lawaves.net
thatsnotmydriveway.com
northportbusinesscenter.com
dayinamman.com
bootsinspectors.com
bluestarryshimmeringsky.com
sprinklekart.com
natiymati.com
basculasperu.com
nurixpharmaceutical.com
themorningprayer.com
clashofkingsgame.net
javkangaroo.com
best10canadianreviews.info
025xy.xyz
businessexpansion2021.com
hitxxxmovies.com
wf-lc.com
imsrisk.com
spreadsheetcrashcourse.com
richardklewis.store
packgames.store
xiluoxtmcwj.com
gvcxyk.com
versebay.com
stopswatting.com
buranipsicologia.com
tgg-customs.com
indevmobility.mobi
buygaia.com
sweetharmony.info
theassistant46.com
espinoza.tech
reginejohansen.com
tecni-freezer.com
clarkallurerepublic.com
robbiesbqs.com
seatachome.com
odbialegostoku.xyz
jvmyl.ink
ethereumwarrior.com
minadermall.com
analoginsight.com
soyinversionista.lat
sumiyoshiku-herunia.xyz
astrovivan.com
sanucaps.com
midam-api.com
pofungrealty.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/1452-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/1452-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2832-11-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2352 set thread context of 1452 2352 rundll32.exe 31 PID 1452 set thread context of 1180 1452 rundll32.exe 21 PID 2832 set thread context of 1180 2832 wlanext.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1452 rundll32.exe 1452 rundll32.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe 2832 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1452 rundll32.exe 1452 rundll32.exe 1452 rundll32.exe 2832 wlanext.exe 2832 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1452 rundll32.exe Token: SeDebugPrivilege 2832 wlanext.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2352 wrote to memory of 1452 2352 rundll32.exe 31 PID 2352 wrote to memory of 1452 2352 rundll32.exe 31 PID 2352 wrote to memory of 1452 2352 rundll32.exe 31 PID 2352 wrote to memory of 1452 2352 rundll32.exe 31 PID 2352 wrote to memory of 1452 2352 rundll32.exe 31 PID 2352 wrote to memory of 1452 2352 rundll32.exe 31 PID 2352 wrote to memory of 1452 2352 rundll32.exe 31 PID 2352 wrote to memory of 1452 2352 rundll32.exe 31 PID 2352 wrote to memory of 1452 2352 rundll32.exe 31 PID 2352 wrote to memory of 1452 2352 rundll32.exe 31 PID 1180 wrote to memory of 2832 1180 Explorer.EXE 32 PID 1180 wrote to memory of 2832 1180 Explorer.EXE 32 PID 1180 wrote to memory of 2832 1180 Explorer.EXE 32 PID 1180 wrote to memory of 2832 1180 Explorer.EXE 32 PID 2832 wrote to memory of 3064 2832 wlanext.exe 33 PID 2832 wrote to memory of 3064 2832 wlanext.exe 33 PID 2832 wrote to memory of 3064 2832 wlanext.exe 33 PID 2832 wrote to memory of 3064 2832 wlanext.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\skjesair.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\skjesair.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\skjesair.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-