Analysis
-
max time kernel
133s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe
-
Size
802KB
-
MD5
14e47d86364381ba663a9d652b70936d
-
SHA1
fc2bd392eac2de5fb3b79fdaf8c68cee3930c848
-
SHA256
65d7fc0bba6176b4d9e081fb04be4ceb3ae759dd7589aedcf46b2482663d6aca
-
SHA512
76a20478c13a12a8f9babe7557fdee4a270ad8287d47decd41e13eb4b024ff9203304afa4431f29cf2d7edf7d73f36af887d93e50b27d62bd17ac265a780902b
-
SSDEEP
12288:CGCCdvAft7X7rjy8U82vkLnfOOiml1bZ:CGdKfXyq2vk1ie
Malware Config
Extracted
formbook
3.8
dg1
pilatesmania.life
5bcoin.com
ammowillcall.com
quickwinz.market
terigele.com
sohotoken.com
tielingwww.site
lz2b3.info
norisc.com
digitalkonsultan.com
925manbetx.com
laricipark.com
quantum7nutrition.com
xceedcg.com
hanagel.com
cane91.download
iotadocker.com
brackenupholstery.com
erfolg-sichern.online
bihuorg.com
julieannemonroe.com
plazalascanas.com
howtodobooks.com
tamsonphotography.city
come-and-read.com
greenbirdeventsnj.com
globalcurrency.money
sunflowersecrets.com
xishencun.com
marcjacobsoutletco.com
creep.directory
studionineyoga.com
yexe.ltd
yz330.com
style-still.com
htdxxv.info
desatlogoblitar.com
kaptenkerang.com
lgh-light.com
rapidproto-expert.com
nail-boo.info
tamvandatranghuy.com
lfmean.com
energgy.tech
vj8ehq.info
ucesi.com
allfiwaterjet.com
nfjqbgja.com
wwnjx.com
03k8qo.info
united-ush.com
www231789.com
ceips.info
888coins.info
tcamersfoorteemvallei.com
healthyphy.com
moisturemasks.com
skepscape.com
chameleon-storytelling.com
shopbrunchwiththegirls.com
swty00555.com
cyanoestudio.com
lcoise.men
seaholidays.info
elsbouse.com
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/672-2-0x0000000005720000-0x0000000005748000-memory.dmp family_zgrat_v1 -
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3396-8-0x0000000000780000-0x00000000007AA000-memory.dmp formbook -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/672-2-0x0000000005720000-0x0000000005748000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 672 set thread context of 3396 672 14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe 97 -
Program crash 1 IoCs
pid pid_target Process procid_target 2252 3396 WerFault.exe 97 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 672 14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 672 wrote to memory of 3396 672 14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe 97 PID 672 wrote to memory of 3396 672 14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe 97 PID 672 wrote to memory of 3396 672 14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe 97 PID 672 wrote to memory of 3396 672 14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe 97 PID 672 wrote to memory of 3396 672 14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe 97 PID 672 wrote to memory of 3396 672 14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14e47d86364381ba663a9d652b70936d_JaffaCakes118.exe"2⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3396 -s 1843⤵
- Program crash
PID:2252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3396 -ip 33961⤵PID:2988