Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 05:20
Static task
static1
Behavioral task
behavioral1
Sample
cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/yfvmdnif.dll
Resource
win7-20240221-en
General
-
Target
cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe
-
Size
501KB
-
MD5
cbea4cf442e07bb6aa122f1b8eddef4d
-
SHA1
d741e5ed6ea3c6d0fb068423a9637e5efa384142
-
SHA256
cf9565db0c7e242dafc592fd88893bf46a3201a17372675fef4cfcbd558d1c5b
-
SHA512
90258c71eb5cc4379c7438f31136d0a2af5e44ad7fbb88c08df1de7cb6d3f954711bad0a18cbb144bd5d70ae7827c25888ce240f54af93d9ff049e725d253248
-
SSDEEP
12288:VSzmwxmwfYOxjTX4tFrM/lxZvrw9bd1kgc:+mwxwO6NulxZc5d1kj
Malware Config
Extracted
formbook
4.1
dn7r
eventphotographerdfw.com
thehalalcoinstaking.com
philipfaziofineart.com
intercoh.com
gaiaseyephotography.com
chatbotforrealestate.com
lovelancemg.com
marlieskasberger.com
elcongoenespanol.info
lepirecredit.com
distribution-concept.com
e99game.com
exit11festival.com
twodollartoothbrushclub.com
cocktailsandlawn.com
performimprove.network
24horas-telefono-11840.com
cosmossify.com
kellenleote.com
perovskite.energy
crosschain.services
xiwanghe.com
mollycayton.com
bonipay.com
uuwyxc.com
viberiokno-online.com
mobceo.com
menzelna.com
tiffaniefoster.com
premiumautowesthartford.com
ownhome.house
bestmartinshop.com
splashstoreofficial.com
guidemining.com
ecshopdemo.com
bestprinting1.com
s-circle2020.com
ncagency.info
easydigitalzone.com
reikiforthecollective.com
theknottteam.com
evolvedpixel.com
japxo.online
ryansqualityrenovations.com
dentimagenquito.net
pantherprints.co.uk
apoporangi.com
thietkemietvuon.net
ifernshop.com
casaruralesgranada.com
camp-3saumons.com
eddsucks.com
blwcd.com
deldlab.com
susanperb.com
autosanitizingsolutions.com
femhouse.com
ironcageclash.com
thekinghealer.com
shaghayeghbovand.com
advertfaces.com
lonriley.com
mased-world.online
mythicspacex.com
yourherogarden.net
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1760-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Loads dropped DLL 2 IoCs
pid Process 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 2120 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1232 set thread context of 1760 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2120 1232 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1760 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1760 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 28 PID 1232 wrote to memory of 1760 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 28 PID 1232 wrote to memory of 1760 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 28 PID 1232 wrote to memory of 1760 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 28 PID 1232 wrote to memory of 1760 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 28 PID 1232 wrote to memory of 1760 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 28 PID 1232 wrote to memory of 1760 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 28 PID 1232 wrote to memory of 2120 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 29 PID 1232 wrote to memory of 2120 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 29 PID 1232 wrote to memory of 2120 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 29 PID 1232 wrote to memory of 2120 1232 cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cbea4cf442e07bb6aa122f1b8eddef4d_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 4962⤵
- Loads dropped DLL
- Program crash
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5c6f46b711b17ddbcb63a52552f1545fd
SHA17f0cf73617829660b06ead76dc37db322f48a565
SHA256fd1e3db80099afb4fad792e226d1055b350ee96286633a356926b7ac180932b0
SHA51225862ccaab810ba1ac3c58b12aa8c114d25436f3f5273c4c59621044b398aa98f4d40569e5232aeaf1ef41c4e396ad172faa71de92aae8d196ad947666cc94f7