Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe
-
Size
867KB
-
MD5
86f59231b4d4b92d9d41a16a142380fe
-
SHA1
3bbadc59af1d5358c0565eadc51ce777d47a0dda
-
SHA256
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf
-
SHA512
1b98f0c970819f7a1f5fb2b8566b4b0c0abb126b747f092f90587189f345a5d3672446b1e762752c3ffcdd0b2f92f28bcb2538e8e14af5abd2b5013a1a0bcaff
-
SSDEEP
12288:gU6HguXUVUAfIOsgKwDV+nm5vc19ApsWSyO7rbdTrcL/SIIcM8zh:EgzQwB8mhMtV5g8z8zh
Malware Config
Extracted
formbook
4.1
g11y
dianedaily.com
grabius.fun
aboodivesakaran.com
ttasum.site
softlytictechpro.com
charlenenicholls.com
money254.info
saleanycoin.com
zhlnas.top
bushelandabean.com
ggaperformance.com
rm168vip.life
getconsol.com
empower-excellence.com
pompgarden.com
spartanburghistorytour.com
thewrkrbees.com
baoslot-adm.com
bizchatgpt777.com
testdomenkinogid-new-1.buzz
print3d.tools
ss182.site
howesdrug.com
spitzpr-ce.info
semiz.xyz
aalean.com
sintracanvas.com
yeddaben.top
hivesense.online
dreamstarworld.com
slammercharter.com
dailyhotjob.com
uplyfttherapy.com
trail-hound.com
vgduf0.top
cheshirecomp.com
taoci.info
residentiallands.com
luxurystaysrye.com
faribolesgallery.com
kidankidan.com
themultisportathlete.com
weresudo.online
kjage.com
meekfish.com
tda4tz.xyz
dolphinkitchen.com
qvodapi003.xyz
ralaserart.com
turifaln.top
manuelprothmann.com
voebarato-ferias2023.com
apimaespratet.com
sharedmfa.cloud
qualitaroccadellemacie.com
t4-1231515.xyz
alecrbarrett.com
leportailrougephotographie.com
jiuding222.vip
healthystep123.com
manodartista.com
retalhosdeesperanca.com
blesten.com
mothernature-fertilizer.com
qieqyt.xyz
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2596-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exedescription pid process target process PID 1688 set thread context of 2596 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exefd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exepid process 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe 2596 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exedescription pid process target process PID 1688 wrote to memory of 2796 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1688 wrote to memory of 2796 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1688 wrote to memory of 2796 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1688 wrote to memory of 2796 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1688 wrote to memory of 2596 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1688 wrote to memory of 2596 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1688 wrote to memory of 2596 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1688 wrote to memory of 2596 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1688 wrote to memory of 2596 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1688 wrote to memory of 2596 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1688 wrote to memory of 2596 1688 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1688-6-0x0000000004E00000-0x0000000004E80000-memory.dmpFilesize
512KB
-
memory/1688-0-0x0000000001230000-0x000000000130E000-memory.dmpFilesize
888KB
-
memory/1688-2-0x0000000004EA0000-0x0000000004EE0000-memory.dmpFilesize
256KB
-
memory/1688-3-0x00000000004D0000-0x00000000004E4000-memory.dmpFilesize
80KB
-
memory/1688-4-0x0000000000500000-0x000000000050A000-memory.dmpFilesize
40KB
-
memory/1688-5-0x0000000000510000-0x000000000051E000-memory.dmpFilesize
56KB
-
memory/1688-1-0x0000000073FE0000-0x00000000746CE000-memory.dmpFilesize
6.9MB
-
memory/1688-14-0x0000000073FE0000-0x00000000746CE000-memory.dmpFilesize
6.9MB
-
memory/2596-7-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2596-9-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2596-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2596-13-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2596-15-0x0000000000700000-0x0000000000A03000-memory.dmpFilesize
3.0MB