Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exe
-
Size
336KB
-
MD5
5396b22800da1f1c7528ae67a5fe011d
-
SHA1
4fdd0248152166f9821e8e447476d595740dae7f
-
SHA256
fd37a492eb083eb43dfd53cf28f0a0840e1bab5a68937080d764ea4df9f90945
-
SHA512
31b407d54af8f8966403c79b3fcd251e4c99d26d693d6774564800f862920cea7f9d3e4a68141512b5aab87b170fde6ad06b656151a7937bd816a1c0591fdd4b
-
SSDEEP
6144:BsKxheSkTu7k0XwWcmoO1HvfvCXRSq40wO8qxtW2HXkZ:BsuheSeuY0glm31/CXT4hgA2HXkZ
Malware Config
Extracted
formbook
3.8
ca
tirtatv.com
thefinalreviews.com
lakesidesrealtor.net
jilinjijin.com
packfreshcannabis.com
mohammedfakiha.com
oilxl.info
xn--doqu1wc86axnn.com
core-marlk.com
truyenvoz.info
ptamed.com
y31000.com
tredaily.com
jsaswkj.com
xiunan.net
panaceagluta.com
kenanalifd.com
0513gx.com
kpdvk04wr3.biz
riobaretanning.com
cryptodiggy.com
0pe659.com
melement.net
bharathstonecrusher.biz
doretirementcommunitiesok.live
theshannabananablog.com
truemusclesnow.com
bodareyesyantonio.com
iaminvisiblebeauty.com
shengdunkeji.com
qbmop.info
templartoken.com
itpros.email
bizkaibus.live
gaeb-365.online
feenkerze.com
regiqsolutions.biz
islamfeed.net
vatanjob.com
kennelbooks.online
14wgwg.com
cadillacgm.com
lqbus.com
imconsulting.amsterdam
ipasok.com
galileinvestmentoffice.com
kd1nine.loan
godporkcutlet.net
deltaapprovalcenter.com
beoio.com
wachstumsfinanzierung.info
kosmuse.net
elbufer-wirtschaftspruefer.com
cleberbarbosa.com
doxagram.win
625broderick.com
healingwellnessresort.com
rbsnce.com
fortecomms.com
otona-syokudo.com
studiocima.net
designedwithdata.com
eazybh.com
olddudegaming.com
crakom.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1820-6-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Drops file in Windows directory 1 IoCs
Processes:
5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\win.ini 5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exepid process 1820 5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exepid process 1820 5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exepid process 1820 5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5396b22800da1f1c7528ae67a5fe011d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:1820