Analysis
-
max time kernel
114s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe
-
Size
557KB
-
MD5
d7f1300dd4f56d7b8e698e94af817056
-
SHA1
f4ab31d7ec432ed0f1cd662b7cb9e656a7fe62c0
-
SHA256
c4edf97ee108849df46eadbc7984bf178d0da690d9825adc7b7cdac465d12605
-
SHA512
6d76f4b0e4e45dc090d096f8e3d215a2575f67fef014d7c7cbcc4b38f1c9723bc5d9031658d8a86e16a3dd40f65f289915740a23ea6a1e06818ef41e38f55a84
-
SSDEEP
12288:2lOvlE/GWSj7ZG17YKdSH4T8gvVaXjSOv/pr0cY/n0unU:2Uvldj7ARjdvBeVn15Sn0r
Malware Config
Extracted
formbook
4.1
jw9u
myhvacdeal.com
therizks2022.com
belondo.com
selflovewithallie.com
fkdosdz3.xyz
2commacluboffers.com
beyazyakaetkinlik.com
5sensesbranding.com
clesioalves.com
home2.xyz
talulaboutique.com
marketing-republic.com
mappilog.com
n1a.site
berlinspecials.com
iphone13.media
healthrapidlab.com
outdoorteakgarden.com
i0bqd8ny.xyz
chairzon.com
bakulbiru.com
menstruationapp.com
solarinsurance.online
spanglisheasycampus.com
bigbritimeuk.site
privacy-mods.com
gethappymelon.com
coxfc.com
pokvy.online
hussjekken.cloud
svetofordp.com
100poses.com
openarmslifecoaching.com
tradingcours.com
kelebekescort.net
tianxianzhu.com
stangetzdoc.com
123tuintafels.com
tawanok.com
bestofverona.net
hearttolens.com
cdstuk.com
dominics.one
forestersretreat.com
40tmr4rz.xyz
mobileflatfix.com
morganswan.com
southpointcove.com
theamishgathering.info
taekwondopembrokepines.com
fatefanserver.com
mcateersolutions.com
somniwellness.com
oscdev.net
sensoryfun4tots.com
alphaomegasolution.com
mentale-auszeit.com
hannitytax.com
7x4vc58t.xyz
outve.info
retroverse.net
lundquist.cloud
baofubuy.xyz
fasthomebuysell.com
gistforamerica.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4584-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4508 set thread context of 4584 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 102 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 4584 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 4584 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 4584 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4508 wrote to memory of 4584 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 102 PID 4508 wrote to memory of 4584 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 102 PID 4508 wrote to memory of 4584 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 102 PID 4508 wrote to memory of 4584 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 102 PID 4508 wrote to memory of 4584 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 102 PID 4508 wrote to memory of 4584 4508 d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d7f1300dd4f56d7b8e698e94af817056_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2260,i,9938964625802268469,1928462186077019554,262144 --variations-seed-version /prefetch:81⤵PID:4168