Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe
-
Size
619KB
-
MD5
8c07acde5c34ee8f47efd7050ede7bd4
-
SHA1
f4e7cd7933f4468fa7d5752463aa198842ad7b2e
-
SHA256
da2458789c338c2719661254515dba2fc92c21ef91a11da3d192a6542ca56814
-
SHA512
4cbb4a91e1ce60cb8d2b7d30307fdcb3c490770b994c9dc34688ada66d7c63fb0edc08cda407fcde2608d3eacdd2b4666702a0b15a008fa144ccd5d2eb26fe78
-
SSDEEP
12288:sxTPnHq1OCpziAVfKrMY+V4xxqjC+thFuNppvppMkkkkkkkkkkkkkkkkkkkkkkkm:stPH0JpOmfKrMfVJCgVn
Malware Config
Extracted
formbook
4.1
cnp0
jiarenyuanhunlian.com
xquizitelashesnwaxx.com
rentinerie.com
herbalpedia-id.com
openseagames.com
re-swap.com
william-cook.com
segensv.com
versebay.com
brendanlairdsound.com
bypestor.com
hospitaldelpc.net
wwwroadrunnerfinancial.com
waterhammerstudios.com
hustleandbank.photography
secure01bchslogin.com
rarepeperanking.com
greatland.company
happybirthdayjewel.com
raheok.store
citrusarrow.coffee
midwest-oktoberfest.com
dpcuow.com
creativeartsfilmacademy.biz
sse-audio.com
offertasuperfibra.com
gizpsikolojikdanisma.com
7aomoquzb9.com
filthycarproductions.online
fuquba.com
lovinzion.com
istanbulmadencilik.com
treasuretroveofrecipes.com
exploitporbrl.xyz
seneorreward.com
sx-mz.com
mylcsservices.digital
paidimage.xyz
tayyqc.com
congoqueen.com
cerrajerovalls.online
iwasehokenservice.net
chuahoinach.net
savouri.online
brandonjanisieski.com
seo-clicks7.com
aplusvibe.com
incotporate.com
webdyx.com
pit.land
sdnfmrmi.com
skinbluecap.com
maestractiva.com
tianshunhong.com
maddenconstance.com
wonderkdesign.com
keycuracao.com
lebzcl.com
toriyabeblog.com
clicksfrog.com
the22yards.club
peakprocesssolutions.com
sustainabilityreview.com
onceuponawreathde.com
ccnsv.net
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2924-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exedescription pid process target process PID 2272 set thread context of 2924 2272 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exepid process 2924 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe 2924 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exepid process 2272 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe 2272 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exedescription pid process target process PID 2272 wrote to memory of 2924 2272 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe PID 2272 wrote to memory of 2924 2272 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe PID 2272 wrote to memory of 2924 2272 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe PID 2272 wrote to memory of 2924 2272 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe PID 2272 wrote to memory of 2924 2272 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe PID 2272 wrote to memory of 2924 2272 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe 8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c07acde5c34ee8f47efd7050ede7bd4_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2272-8-0x0000000074500000-0x0000000074CB0000-memory.dmpFilesize
7.7MB
-
memory/2272-4-0x0000000005690000-0x00000000056A0000-memory.dmpFilesize
64KB
-
memory/2272-0-0x0000000074500000-0x0000000074CB0000-memory.dmpFilesize
7.7MB
-
memory/2272-3-0x0000000005490000-0x0000000005522000-memory.dmpFilesize
584KB
-
memory/2272-9-0x0000000005690000-0x00000000056A0000-memory.dmpFilesize
64KB
-
memory/2272-5-0x0000000005420000-0x000000000542A000-memory.dmpFilesize
40KB
-
memory/2272-6-0x0000000005690000-0x00000000056A0000-memory.dmpFilesize
64KB
-
memory/2272-10-0x0000000005690000-0x00000000056A0000-memory.dmpFilesize
64KB
-
memory/2272-2-0x0000000005A40000-0x0000000005FE4000-memory.dmpFilesize
5.6MB
-
memory/2272-1-0x00000000009D0000-0x0000000000A70000-memory.dmpFilesize
640KB
-
memory/2272-7-0x0000000008710000-0x000000000871E000-memory.dmpFilesize
56KB
-
memory/2272-11-0x0000000008BC0000-0x0000000008C5C000-memory.dmpFilesize
624KB
-
memory/2272-12-0x0000000008D00000-0x0000000008D58000-memory.dmpFilesize
352KB
-
memory/2272-15-0x0000000074500000-0x0000000074CB0000-memory.dmpFilesize
7.7MB
-
memory/2924-13-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2924-16-0x0000000001430000-0x000000000177A000-memory.dmpFilesize
3.3MB
-
memory/2924-17-0x0000000001430000-0x000000000177A000-memory.dmpFilesize
3.3MB