Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe
-
Size
599KB
-
MD5
2171d7a11c215bdd470fcd398c776b6d
-
SHA1
5e87f0159bd179e69d935f1fcbc29c17bb72cea7
-
SHA256
b8cc9e2b1509abfb88b4b570456839e5c00a7ffa52da7ef3333eef7d7b00922c
-
SHA512
ce7baa4240d9a4fd9b89019739d369276d4b5ada3bd831147fe20a95ae2263b71c5e824d54af0f17df5c44edb6501058e79490e52e3a759e1b3b8f42beb8fe8b
-
SSDEEP
12288:rosspP5Lzf8osspP5LzfdxrEjf3kEHjyaQ4:opP5LTLpP5LTDA1uaQ4
Malware Config
Extracted
formbook
3.8
h35
maraudersinc.com
liebianwangluo.com
visit-australia.info
machiyane-kasukabe.com
hafizclub.com
merkburn.net
favoritetraffic2updating.win
adrian-oeser.net
nkshopdomaincpplt234.info
imperiodofutebol.com
welometocaloundra.com
thehealthypose.com
squalloptna.com
bobknowsbest.com
damgproperties.com
wastemastershire.co.uk
swacballet.com
japanbreakingnews.com
bjufaa.info
aryakuza.com
ericbellband.com
undecrypt.com
printrade.win
stfuxxxx.com
xn--m7rv64cc7d7q1an8c.com
aeints.net
agrotecsol.com
rntme.com
dqdrpmm.com
inseedbrand.com
0x1tenmoney.men
khudothidongvan2.com
newcasinouk.com
avocatdedieu.com
cagewo.com
tmay.ltd
35s4.review
blipeducated.com
businesscoveragetop.online
syxjsn.com
commspacein.com
johns.zone
cj336.com
mario-vestec.com
saviorpalliative.info
motherloderiches.com
socialworld.site
yongshiquan.com
listingbussiness.com
irritablebowelsyndromeip.com
brazoriacountynavy.info
greencoffeebeans.store
kk6z.com
blacktaxi.online
homeremedyforum.com
khujn.com
pipeai.com
www502789.com
bbz168.com
copydinner.win
wwwdld005.com
forumin3d.net
bacarragroup.com
sarandipiagaldar.com
dotcex.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/3036-6-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/3036-11-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2964 set thread context of 3036 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe 28 PID 3036 set thread context of 1124 3036 RegAsm.exe 20 PID 2424 set thread context of 1124 2424 rundll32.exe 20 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3036 RegAsm.exe 3036 RegAsm.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe 2424 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3036 RegAsm.exe 3036 RegAsm.exe 3036 RegAsm.exe 2424 rundll32.exe 2424 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe Token: SeDebugPrivilege 3036 RegAsm.exe Token: SeDebugPrivilege 2424 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3036 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3036 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3036 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3036 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3036 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3036 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3036 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3036 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3036 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3036 2964 2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe 28 PID 1124 wrote to memory of 2424 1124 Explorer.EXE 29 PID 1124 wrote to memory of 2424 1124 Explorer.EXE 29 PID 1124 wrote to memory of 2424 1124 Explorer.EXE 29 PID 1124 wrote to memory of 2424 1124 Explorer.EXE 29 PID 1124 wrote to memory of 2424 1124 Explorer.EXE 29 PID 1124 wrote to memory of 2424 1124 Explorer.EXE 29 PID 1124 wrote to memory of 2424 1124 Explorer.EXE 29 PID 2424 wrote to memory of 2092 2424 rundll32.exe 30 PID 2424 wrote to memory of 2092 2424 rundll32.exe 30 PID 2424 wrote to memory of 2092 2424 rundll32.exe 30 PID 2424 wrote to memory of 2092 2424 rundll32.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2171d7a11c215bdd470fcd398c776b6d_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2092
-
-