Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
1443aeb7d2b64786ac3d1850b14b75ea_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
1443aeb7d2b64786ac3d1850b14b75ea_JaffaCakes118.exe
-
Size
316KB
-
MD5
1443aeb7d2b64786ac3d1850b14b75ea
-
SHA1
c2324326f90e73e8f06c4de4b7db8c6e9087d554
-
SHA256
941c04730660395de5be98fccc9c680ce2519f22602513640444540868133626
-
SHA512
b28defb1715b4ae2f2074e36c4a4dd587da919f1a1456ddb84ac12bffc8306b048f58fdd5f2c1c0f7f1baa806404a20765e3c76fb1431b2b20040b1ee6c00af2
-
SSDEEP
6144:tmMJLNIhKlyEH2ZZUIOq/7qZqD9U+w/8I/JMl/b9BNtxR:tmMJLNI9EHK4q/AqD9ovRm
Malware Config
Extracted
formbook
3.8
je
jutoutiao360.com
1b9ninework.men
leveldistro.com
drunkanimoji.com
federicagenini.com
xn--metherwallet-qlb.com
nuestroespaciodigital.info
stampitnet.net
madeofberlin.com
lbhrki.info
solutions-it.tech
tonu.ltd
cestmoichristine.com
thenewnormalclub.com
homezproductions.com
sg1plumber.com
4640pe.com
katipogluyapi.com
zvcc89loa.biz
8894m.com
pxlpills.com
daweipeninsula.com
joymysew.com
verificaridapple.com
bnifoundersregion.com
bancosantander-net.com
zwetschi.net
wap1click.com
jiaogulan.online
cshfqlyi.click
travelmobility2.com
diyetisyendiyet.com
1k8threelike.men
alexdaniela2018.com
yinyangbeach.com
stonewalldev.com
porscheshared.com
redivemcommaster.online
xadalong.com
bows.black
natuzzimcr.com
bet-engine.com
exodoformaturas.com
mychefltd.com
low-carb.online
coolcloudhome.media
karlozmartines.com
incimedikal.net
climadeportivo.com
caolybj.com
jishucoffee.com
yarries.com
protectry2693.win
slicksaving.com
ymtuoe.men
burbstv.com
calamel-mommy.com
ectoplasum.com
cellbreathe.com
zhuxianquanji.com
astralgeek33.com
091ope.com
takeaim.today
leylagold.com
telcolaj.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1720-2-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1720 1443aeb7d2b64786ac3d1850b14b75ea_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1720 1443aeb7d2b64786ac3d1850b14b75ea_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1720 1443aeb7d2b64786ac3d1850b14b75ea_JaffaCakes118.exe