Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe
-
Size
867KB
-
MD5
86f59231b4d4b92d9d41a16a142380fe
-
SHA1
3bbadc59af1d5358c0565eadc51ce777d47a0dda
-
SHA256
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf
-
SHA512
1b98f0c970819f7a1f5fb2b8566b4b0c0abb126b747f092f90587189f345a5d3672446b1e762752c3ffcdd0b2f92f28bcb2538e8e14af5abd2b5013a1a0bcaff
-
SSDEEP
12288:gU6HguXUVUAfIOsgKwDV+nm5vc19ApsWSyO7rbdTrcL/SIIcM8zh:EgzQwB8mhMtV5g8z8zh
Malware Config
Extracted
formbook
4.1
g11y
dianedaily.com
grabius.fun
aboodivesakaran.com
ttasum.site
softlytictechpro.com
charlenenicholls.com
money254.info
saleanycoin.com
zhlnas.top
bushelandabean.com
ggaperformance.com
rm168vip.life
getconsol.com
empower-excellence.com
pompgarden.com
spartanburghistorytour.com
thewrkrbees.com
baoslot-adm.com
bizchatgpt777.com
testdomenkinogid-new-1.buzz
print3d.tools
ss182.site
howesdrug.com
spitzpr-ce.info
semiz.xyz
aalean.com
sintracanvas.com
yeddaben.top
hivesense.online
dreamstarworld.com
slammercharter.com
dailyhotjob.com
uplyfttherapy.com
trail-hound.com
vgduf0.top
cheshirecomp.com
taoci.info
residentiallands.com
luxurystaysrye.com
faribolesgallery.com
kidankidan.com
themultisportathlete.com
weresudo.online
kjage.com
meekfish.com
tda4tz.xyz
dolphinkitchen.com
qvodapi003.xyz
ralaserart.com
turifaln.top
manuelprothmann.com
voebarato-ferias2023.com
apimaespratet.com
sharedmfa.cloud
qualitaroccadellemacie.com
t4-1231515.xyz
alecrbarrett.com
leportailrougephotographie.com
jiuding222.vip
healthystep123.com
manodartista.com
retalhosdeesperanca.com
blesten.com
mothernature-fertilizer.com
qieqyt.xyz
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/632-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exedescription pid process target process PID 1792 set thread context of 632 1792 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exepid process 632 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe 632 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exedescription pid process target process PID 1792 wrote to memory of 632 1792 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1792 wrote to memory of 632 1792 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1792 wrote to memory of 632 1792 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1792 wrote to memory of 632 1792 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1792 wrote to memory of 632 1792 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe PID 1792 wrote to memory of 632 1792 fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/632-11-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/632-15-0x0000000001000000-0x000000000134A000-memory.dmpFilesize
3.3MB
-
memory/632-14-0x0000000001000000-0x000000000134A000-memory.dmpFilesize
3.3MB
-
memory/1792-6-0x0000000005080000-0x0000000005094000-memory.dmpFilesize
80KB
-
memory/1792-4-0x0000000002920000-0x0000000002930000-memory.dmpFilesize
64KB
-
memory/1792-5-0x0000000004DF0000-0x0000000004DFA000-memory.dmpFilesize
40KB
-
memory/1792-1-0x0000000074BD0000-0x0000000075380000-memory.dmpFilesize
7.7MB
-
memory/1792-7-0x00000000050B0000-0x00000000050BA000-memory.dmpFilesize
40KB
-
memory/1792-8-0x00000000050C0000-0x00000000050CE000-memory.dmpFilesize
56KB
-
memory/1792-9-0x00000000060A0000-0x0000000006120000-memory.dmpFilesize
512KB
-
memory/1792-10-0x0000000008830000-0x00000000088CC000-memory.dmpFilesize
624KB
-
memory/1792-3-0x0000000004E40000-0x0000000004ED2000-memory.dmpFilesize
584KB
-
memory/1792-13-0x0000000074BD0000-0x0000000075380000-memory.dmpFilesize
7.7MB
-
memory/1792-2-0x00000000054C0000-0x0000000005A64000-memory.dmpFilesize
5.6MB
-
memory/1792-0-0x0000000000310000-0x00000000003EE000-memory.dmpFilesize
888KB