Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe
-
Size
564KB
-
MD5
639066f415f7a4dc58e1890975e9fcc5
-
SHA1
b97a2f3afbf5b09e155cd99d035cf6f2e3f347f2
-
SHA256
9bac39b4b986f2f96008c4c6c05cf72ddc6398d99d874525058b654b52cfd64d
-
SHA512
7d671232f99178c708ba3cb47e93e14046bbd9ec5a27942156ec07d2911be9b4f43cd56b9a2d2eb8cb71e3f7c25d6ebfbeab4ab15ae7501cf368aee06c00f38e
-
SSDEEP
12288:Rb3RoudOSY3hsmJ6LQ3j2rBFr55AoOiMsos1kubd:Rb3RrdOSKRJ6LQ3j2NFrTHZNJbd
Malware Config
Extracted
formbook
3.9
i01
viagensbaratasonline.com
lacuevaelmirlo.net
genevaly.com
analpornolariizle.com
rupee.network
pay69645.com
superhsr.com
foammemorymattress.com
jolded.com
bbb684.com
diabetessimplesweet.com
bybeast.com
keut.world
xxjj10.com
youde-88.com
highkickproductions.com
beijingzhjy.com
partnership-aid.com
sehorecollegesehore.com
wangluopay.com
prfromafar.com
gymingreviews.com
gongjubu.com
pp-kontoservice.net
genesiscrafter.com
zurnpx.men
i-baoshan.com
areyoulivingyourlifepurpose.com
snseos.info
nrglighter.com
powergridenergysolutions.com
wspi-shipping.com
zharemedia.com
theexpandedmind.net
veteransforhouston.info
hbqnkjzxxy.com
ikraenglish.com
activpot.net
mobile-exchangeoffer.download
my-spar.com
grubfanatic.com
5173games.com
myfinancialnavigator.com
sacralworld.com
hocaoglugroupgayrimenkul.com
p3rdu-f70ur.com
fileextensionsys.com
skid.agency
wysholdings.com
genomicplasticity.com
facturebi.com
cubicproltd.com
anak-warteg.com
pssdqk.win
aaa4d.info
evolutaprofessional.com
kirstinpinit.com
cheapbookingrooms.com
caldaietop.com
admin.management
tiptotailgrooming.com
yxyx661.com
kivinstech.online
undermoments.info
virxus.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2740-6-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2052 2740 WerFault.exe 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exepid process 2740 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe 2740 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exepid process 2740 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe 2740 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exepid process 2740 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe 2740 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exepid process 2740 639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\639066f415f7a4dc58e1890975e9fcc5_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 9042⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2740 -ip 27401⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2740-6-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2740-7-0x00000000773C1000-0x00000000774E1000-memory.dmpFilesize
1.1MB
-
memory/2740-4-0x0000000002C00000-0x0000000002C10000-memory.dmpFilesize
64KB
-
memory/2740-3-0x0000000002C00000-0x0000000002C10000-memory.dmpFilesize
64KB
-
memory/2740-8-0x000000000BE10000-0x000000000C15A000-memory.dmpFilesize
3.3MB