Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe
-
Size
531KB
-
MD5
0485b82d63f7ad0fcf8fb8cad375d27c
-
SHA1
cd5a1c7eac16d6de771d82aafc0b88d3446dcd51
-
SHA256
51d534b716e35b643ac2a4aa73effe9607abfc61a36b7b4a423c9383002b755e
-
SHA512
b18d8513051ba56a4e3a0b8fdf0ade811ea0fe7636cd1d910f0c6bfad8def2c8062f5aa360ff48f8ecdc8534885accc510d98e67d6e7443f178e23549e608a98
-
SSDEEP
12288:dMTWwo00fX2qu4YENqlj4aYbwAA1dju0WEIdRBCQaPOonyLQSB:dio00PW4DUwEAA1qDBCQsOo0B
Malware Config
Extracted
formbook
4.1
mxwf
orders-cialis.info
auctionorbuy.com
meanmugsamore.com
yachtcrewmark.com
sacredkashilifestudio.net
themintyard.com
bragafoods.com
sierp.com
hausofdeme.com
anthonyjames915.com
bajardepesoencasa.com
marciaroyal.com
earringlifter.com
dsdjfhd9ddksa1as.info
bmzproekt.com
employmentbc.com
ptsdtreatment.space
vrchance.com
cnrongding.com
welovelit.com
intercourierdelivery.services
ianwhitewrite.com
afcerd.com
beneficiodemedicare.com
gatel3ess.com
salesnksportswt.top
thewellnessloft365.com
totensa.com
jessicatheisen.com
snowtographers.com
executrainpr.com
puttypaw.com
popcorntimeipad.com
heyconi.com
llanoresources.com
ibusinesshero.com
1euro1ad.com
sparkleeapp.com
zhuxiugyh.com
calvinmaphoto.com
bjmaomao.com
isaacfujiki.com
zipwhipper.com
kontrollstutzen.com
hannaheason.media
zgcbw.net
letteringdagabi.com
kitefabrics.com
andherieastoffices.com
thewellnesstravelcompany.info
ohio.works
beacharita.com
alphamillls.com
sassandvinegar.com
usauber.com
ceylonherbslk.com
richardggreenhill.com
groupdae.com
jupiterccc.com
indoovo.com
sunnytheodora.com
gxpgfz.com
shoppandaxpress.com
heiboard.com
zahnimplantatangebotede.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1040-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exedescription pid process target process PID 3148 set thread context of 1040 3148 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exepid process 1040 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 1040 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exedescription pid process target process PID 3148 wrote to memory of 1040 3148 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe PID 3148 wrote to memory of 1040 3148 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe PID 3148 wrote to memory of 1040 3148 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe PID 3148 wrote to memory of 1040 3148 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe PID 3148 wrote to memory of 1040 3148 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe PID 3148 wrote to memory of 1040 3148 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe 0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0485b82d63f7ad0fcf8fb8cad375d27c_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1040-11-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1040-14-0x0000000001B00000-0x0000000001E4A000-memory.dmpFilesize
3.3MB
-
memory/3148-6-0x0000000006370000-0x000000000637A000-memory.dmpFilesize
40KB
-
memory/3148-3-0x0000000004AC0000-0x0000000004B52000-memory.dmpFilesize
584KB
-
memory/3148-4-0x0000000004A20000-0x0000000004A30000-memory.dmpFilesize
64KB
-
memory/3148-5-0x0000000004C70000-0x0000000004C7A000-memory.dmpFilesize
40KB
-
memory/3148-0-0x0000000000080000-0x000000000010C000-memory.dmpFilesize
560KB
-
memory/3148-7-0x0000000075100000-0x00000000758B0000-memory.dmpFilesize
7.7MB
-
memory/3148-8-0x0000000004A20000-0x0000000004A30000-memory.dmpFilesize
64KB
-
memory/3148-9-0x0000000006380000-0x000000000641C000-memory.dmpFilesize
624KB
-
memory/3148-10-0x00000000064A0000-0x0000000006518000-memory.dmpFilesize
480KB
-
memory/3148-2-0x0000000005070000-0x0000000005614000-memory.dmpFilesize
5.6MB
-
memory/3148-13-0x0000000075100000-0x00000000758B0000-memory.dmpFilesize
7.7MB
-
memory/3148-1-0x0000000075100000-0x00000000758B0000-memory.dmpFilesize
7.7MB