Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe
-
Size
531KB
-
MD5
0485b82d63f7ad0fcf8fb8cad375d27c
-
SHA1
cd5a1c7eac16d6de771d82aafc0b88d3446dcd51
-
SHA256
51d534b716e35b643ac2a4aa73effe9607abfc61a36b7b4a423c9383002b755e
-
SHA512
b18d8513051ba56a4e3a0b8fdf0ade811ea0fe7636cd1d910f0c6bfad8def2c8062f5aa360ff48f8ecdc8534885accc510d98e67d6e7443f178e23549e608a98
-
SSDEEP
12288:dMTWwo00fX2qu4YENqlj4aYbwAA1dju0WEIdRBCQaPOonyLQSB:dio00PW4DUwEAA1qDBCQsOo0B
Malware Config
Extracted
formbook
4.1
mxwf
orders-cialis.info
auctionorbuy.com
meanmugsamore.com
yachtcrewmark.com
sacredkashilifestudio.net
themintyard.com
bragafoods.com
sierp.com
hausofdeme.com
anthonyjames915.com
bajardepesoencasa.com
marciaroyal.com
earringlifter.com
dsdjfhd9ddksa1as.info
bmzproekt.com
employmentbc.com
ptsdtreatment.space
vrchance.com
cnrongding.com
welovelit.com
intercourierdelivery.services
ianwhitewrite.com
afcerd.com
beneficiodemedicare.com
gatel3ess.com
salesnksportswt.top
thewellnessloft365.com
totensa.com
jessicatheisen.com
snowtographers.com
executrainpr.com
puttypaw.com
popcorntimeipad.com
heyconi.com
llanoresources.com
ibusinesshero.com
1euro1ad.com
sparkleeapp.com
zhuxiugyh.com
calvinmaphoto.com
bjmaomao.com
isaacfujiki.com
zipwhipper.com
kontrollstutzen.com
hannaheason.media
zgcbw.net
letteringdagabi.com
kitefabrics.com
andherieastoffices.com
thewellnesstravelcompany.info
ohio.works
beacharita.com
alphamillls.com
sassandvinegar.com
usauber.com
ceylonherbslk.com
richardggreenhill.com
groupdae.com
jupiterccc.com
indoovo.com
sunnytheodora.com
gxpgfz.com
shoppandaxpress.com
heiboard.com
zahnimplantatangebotede.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2604-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exedescription pid process target process PID 2292 set thread context of 2604 2292 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exepid process 2604 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exedescription pid process target process PID 2292 wrote to memory of 2604 2292 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe PID 2292 wrote to memory of 2604 2292 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe PID 2292 wrote to memory of 2604 2292 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe PID 2292 wrote to memory of 2604 2292 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe PID 2292 wrote to memory of 2604 2292 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe PID 2292 wrote to memory of 2604 2292 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe PID 2292 wrote to memory of 2604 2292 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2292-6-0x0000000002270000-0x00000000022E8000-memory.dmpFilesize
480KB
-
memory/2292-1-0x0000000073FB0000-0x000000007469E000-memory.dmpFilesize
6.9MB
-
memory/2292-2-0x0000000004E80000-0x0000000004EC0000-memory.dmpFilesize
256KB
-
memory/2292-3-0x0000000000470000-0x000000000047A000-memory.dmpFilesize
40KB
-
memory/2292-4-0x0000000073FB0000-0x000000007469E000-memory.dmpFilesize
6.9MB
-
memory/2292-5-0x0000000004E80000-0x0000000004EC0000-memory.dmpFilesize
256KB
-
memory/2292-0-0x0000000000890000-0x000000000091C000-memory.dmpFilesize
560KB
-
memory/2292-14-0x0000000073FB0000-0x000000007469E000-memory.dmpFilesize
6.9MB
-
memory/2604-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2604-9-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2604-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2604-13-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2604-15-0x0000000000AB0000-0x0000000000DB3000-memory.dmpFilesize
3.0MB