Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe
-
Size
355KB
-
MD5
4372c18fbe734ef31fffe8fbde52adda
-
SHA1
4b65e3ea741ba115088ffd0915e7f1963c4d91bc
-
SHA256
f5fa18d39f0b842d6a142a8c6da920bc494e880b5909b196fa68e7e6ffe4604c
-
SHA512
f906dfc4ae493b57c974770b1f2dc9d00a1c8a69e1e1eb625ef5eecc67fb385b1b68d4d0547d2aa6a195b4a6a4348a3919338d41511e9f83e9b243fd14e182d9
-
SSDEEP
6144:l9m82gw6NuqWzgETzScJHGfX80mzZPN/Wbt/jOXTTwhA4rdr:XKSuqWqcJmf8FxhWFjOXvkr
Malware Config
Extracted
formbook
3.9
po
toptravelbox.com
564manbetx.com
rainmakerfreedom.com
caobi954.com
vananhhandmade.com
reisengeniessen.net
milan000.com
opebet181.com
betshoppersparadise.com
zersenengineering.com
www4021166.com
itgifbhfhfg.online
wagertoken.com
casinomansions.net
gabiethiagomendes.com
com-services-secure-id.info
workdigitalmarketing.com
housesforcashpros.link
redsealdigital.com
hj1986.com
plantbasedlovean.com
spm-team.net
sweetkeisha.com
voiceid.info
zelnorm-recall.com
herebefour.com
ho-o.com
zy2ten.loan
reworxeco.com
08iub4eyhb3bkjg.info
186flw.com
atthejam.com
tikteq.com
congregatehealth.com
accesoriospielmexico.com
cabansiegel.net
scjynmy.com
smoontal.net
taxigid.com
teaingredientsjps.online
thefitdynasty.com
forestgravity.win
blick-zukunft.com
believers.press
whirlwindwanderersblog.com
vimexx.support
retailercloud.net
thebabygiant.info
lubb89891.com
ursweetpea.com
restaurantsat.com
alttilsykkelen.com
hahsmj.com
ja6five.loan
ormaisialors.com
thelagoshustler.com
whitsundaysbnbretreat.com
beaware.live
deine-sofortkauf.win
circumstancedistillery.net
test-gk2585.tech
vojo.ltd
578364.com
caps-mail.net
bvasetro.com
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3744-6-0x0000000007080000-0x00000000070AC000-memory.dmp family_zgrat_v1 -
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2056-11-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/3744-6-0x0000000007080000-0x00000000070AC000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exedescription pid Process procid_target PID 3744 set thread context of 2056 3744 4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exepid Process 2056 4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe 2056 4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 3744 4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exedescription pid Process procid_target PID 3744 wrote to memory of 2056 3744 4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe 90 PID 3744 wrote to memory of 2056 3744 4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe 90 PID 3744 wrote to memory of 2056 3744 4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe 90 PID 3744 wrote to memory of 2056 3744 4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe 90 PID 3744 wrote to memory of 2056 3744 4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe 90 PID 3744 wrote to memory of 2056 3744 4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4372c18fbe734ef31fffe8fbde52adda_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-