Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe
-
Size
564KB
-
MD5
639066f415f7a4dc58e1890975e9fcc5
-
SHA1
b97a2f3afbf5b09e155cd99d035cf6f2e3f347f2
-
SHA256
9bac39b4b986f2f96008c4c6c05cf72ddc6398d99d874525058b654b52cfd64d
-
SHA512
7d671232f99178c708ba3cb47e93e14046bbd9ec5a27942156ec07d2911be9b4f43cd56b9a2d2eb8cb71e3f7c25d6ebfbeab4ab15ae7501cf368aee06c00f38e
-
SSDEEP
12288:Rb3RoudOSY3hsmJ6LQ3j2rBFr55AoOiMsos1kubd:Rb3RrdOSKRJ6LQ3j2NFrTHZNJbd
Malware Config
Extracted
formbook
3.9
i01
viagensbaratasonline.com
lacuevaelmirlo.net
genevaly.com
analpornolariizle.com
rupee.network
pay69645.com
superhsr.com
foammemorymattress.com
jolded.com
bbb684.com
diabetessimplesweet.com
bybeast.com
keut.world
xxjj10.com
youde-88.com
highkickproductions.com
beijingzhjy.com
partnership-aid.com
sehorecollegesehore.com
wangluopay.com
prfromafar.com
gymingreviews.com
gongjubu.com
pp-kontoservice.net
genesiscrafter.com
zurnpx.men
i-baoshan.com
areyoulivingyourlifepurpose.com
snseos.info
nrglighter.com
powergridenergysolutions.com
wspi-shipping.com
zharemedia.com
theexpandedmind.net
veteransforhouston.info
hbqnkjzxxy.com
ikraenglish.com
activpot.net
mobile-exchangeoffer.download
my-spar.com
grubfanatic.com
5173games.com
myfinancialnavigator.com
sacralworld.com
hocaoglugroupgayrimenkul.com
p3rdu-f70ur.com
fileextensionsys.com
skid.agency
wysholdings.com
genomicplasticity.com
facturebi.com
cubicproltd.com
anak-warteg.com
pssdqk.win
aaa4d.info
evolutaprofessional.com
kirstinpinit.com
cheapbookingrooms.com
caldaietop.com
admin.management
tiptotailgrooming.com
yxyx661.com
kivinstech.online
undermoments.info
virxus.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1764-5-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exepid process 1764 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exepid process 1764 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe 1764 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exepid process 1764 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe 1764 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exepid process 1764 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exepid process 1764 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1764-5-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1764-7-0x0000000077611000-0x0000000077712000-memory.dmpFilesize
1.0MB
-
memory/1764-4-0x0000000003900000-0x0000000003940000-memory.dmpFilesize
256KB
-
memory/1764-3-0x0000000003900000-0x0000000003940000-memory.dmpFilesize
256KB
-
memory/1764-8-0x0000000077610000-0x00000000777B9000-memory.dmpFilesize
1.7MB
-
memory/1764-10-0x0000000077610000-0x00000000777B9000-memory.dmpFilesize
1.7MB