Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe
-
Size
965KB
-
MD5
fd18568bf53506ddceacfeee0210e8c8
-
SHA1
433fd427aec8735453907988c31f63831c1c487d
-
SHA256
a4271f90dd2b97e70d59e02ccd1f2337446e0fea5beb5a40daa79553c6fb53d0
-
SHA512
268b588b8c0b435f548b26d8019fdd5f2a184c67b9ad4578bc95937f52f50d210407c17a8d928b2a8a662cf06482caeef5e4c8e31d129a082fd5b5eba83efe61
-
SSDEEP
12288:nuDc9F3nC0Py3gAhSEJbjJEK9guo0lMS5WqlH3vqlIvDV9oAggPKSA/pYkT5d:2gJKlHmIvzmSWZT5
Malware Config
Extracted
formbook
4.1
kkt
inspirafutebol.com
customgiftshouston.com
mycreativelending.com
psplaystore.com
newlivingsolutionshop.com
dechefamsterdam.com
servicingl0ans.com
atsdholdings.com
manifestarz.com
sequenceanalytica.com
gethealthcaresmart.com
theartofsurprises.com
pirateequitypatrick.com
alliance-ce.com
wingrushusa.com
funtimespheres.com
solevux.com
antimasathya.com
profitexcavator.com
lankeboxshop.com
aarthiramamurthy.com
oldmopaiv.xyz
mavispaguzellik.com
milkamax.com
sputnikvasisi.com
gametoyou.com
sisconbol.com
thedreamcertificate.com
vichy-menuiserie.com
pv-step.com
growingmindstrilingual.com
tlcrentny.com
jedshomebuilders.com
curtailit.com
integruschamber.com
lanzamientosbimbocolombia.com
tightlinesfishingco.com
doubleuphome.com
arctic.solar
unstopabbledomains.com
aggiornamento-isp.info
clarkandhurnlaw.com
barefootbirthstl.com
seanfeuct.com
measureformeasurehome.com
stephsavy.com
loveflowersandevents.com
czsis.com
midnightblueinc.com
today.dental
customwithme.com
edisetiyo.com
jasoneganrealtor.com
rihxertiza.com
seahorseblast.net
nedayerasa.com
cliftonheightshoa.net
theprofilemba.com
cfwoods.com
dogggo.com
casatranquillainletbeach.com
u1023.com
aromakapseln.com
zhwanjie.com
hometowncashbuyersgroup.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3928-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exedescription pid process target process PID 380 set thread context of 3928 380 fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exepid process 3928 fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe 3928 fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exedescription pid process target process PID 380 wrote to memory of 3928 380 fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe PID 380 wrote to memory of 3928 380 fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe PID 380 wrote to memory of 3928 380 fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe PID 380 wrote to memory of 3928 380 fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe PID 380 wrote to memory of 3928 380 fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe PID 380 wrote to memory of 3928 380 fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd18568bf53506ddceacfeee0210e8c8_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/380-8-0x00000000752A0000-0x0000000075A50000-memory.dmpFilesize
7.7MB
-
memory/380-6-0x00000000057A0000-0x00000000057AA000-memory.dmpFilesize
40KB
-
memory/380-2-0x0000000005CD0000-0x0000000006274000-memory.dmpFilesize
5.6MB
-
memory/380-3-0x00000000057C0000-0x0000000005852000-memory.dmpFilesize
584KB
-
memory/380-1-0x00000000752A0000-0x0000000075A50000-memory.dmpFilesize
7.7MB
-
memory/380-5-0x0000000005750000-0x0000000005760000-memory.dmpFilesize
64KB
-
memory/380-0-0x0000000000CE0000-0x0000000000DD6000-memory.dmpFilesize
984KB
-
memory/380-7-0x0000000006EF0000-0x0000000006F08000-memory.dmpFilesize
96KB
-
memory/380-4-0x0000000005860000-0x00000000058FC000-memory.dmpFilesize
624KB
-
memory/380-9-0x0000000005750000-0x0000000005760000-memory.dmpFilesize
64KB
-
memory/380-10-0x00000000070D0000-0x0000000007174000-memory.dmpFilesize
656KB
-
memory/380-11-0x0000000006CE0000-0x0000000006D14000-memory.dmpFilesize
208KB
-
memory/380-14-0x00000000752A0000-0x0000000075A50000-memory.dmpFilesize
7.7MB
-
memory/3928-12-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3928-15-0x00000000016C0000-0x0000000001A0A000-memory.dmpFilesize
3.3MB
-
memory/3928-16-0x00000000016C0000-0x0000000001A0A000-memory.dmpFilesize
3.3MB