Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
640697fb17bca815e114b38b305124aa_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
640697fb17bca815e114b38b305124aa_JaffaCakes118.exe
-
Size
400KB
-
MD5
640697fb17bca815e114b38b305124aa
-
SHA1
69fecc45676a3913b2a58b7017bfb6a284bfe3a0
-
SHA256
f78e509ec3ba4a6a2391ef33aa6d6bd82071bf4993f9527ad0b3c599bed5ea7f
-
SHA512
a97b5fb1b8d7508033caf94c09adf7f06a12a6e127f9737cb6f819c6b32fbf590d091bca035ee3d3a0e452bffe447c50038876e66f86dc34739f39414b71d21f
-
SSDEEP
12288:r3OdHilEQrfuPbhv/MNLwl+8L41u1EEDv:rgClEufi8NLwl+8k
Malware Config
Extracted
formbook
3.8
ko
html5zone.com
kennet.cloud
yakaoren.com
bestgirlswonderfulvideo.site
ramurho.com
jinkugw.com
dehraduncoachingacademy.com
lfheater.com
ungzwt.men
aliqiutian.com
lansvallarta.com
morrisimage.win
doppledecker.com
serpaca.com
inversebuy.com
businesalue.com
lotustvhouston.net
dipa.ltd
adscreate.business
xn--3ds50hcyhf6z.com
0b7zerobecause.men
jsydxr.com
kjoilfield.com
mingjianjiankang.com
thereformlab.com
idaho100.com
rsqdl.com
shouxin-ic.com
haustechnik-muenster.info
hatherellschultz.com
adiwear.group
n3bbq.com
nbielektromakjv.com
cafeinadisenio.com
endversion.com
theeternalgod.info
xiaobeigou.com
pradabagsonline.com
frootjill.com
fdtme.com
cape-mtb-tours.com
aquamule.net
parsedesign.info
mcas-test16.com
biomimeticdentalstudio.com
pennypedaler.com
e-health.cloud
trekminings.com
1chudao.com
lcet.faith
levkovideo.com
lastcallraleigh.com
dosacornervancouver.com
momentdequalite.com
aristocratdayton.com
trinityconsvltants.com
paperbag-hikakutuhan.biz
latinticket.win
shengdexing.ltd
fotozeon.info
paintriteinc.com
getprizes4me.com
charleneratchford.com
lierjkgl.com
fastmor.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5072-3-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2488 5072 WerFault.exe 640697fb17bca815e114b38b305124aa_JaffaCakes118.exe 4608 5072 WerFault.exe 640697fb17bca815e114b38b305124aa_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
640697fb17bca815e114b38b305124aa_JaffaCakes118.exepid process 5072 640697fb17bca815e114b38b305124aa_JaffaCakes118.exe 5072 640697fb17bca815e114b38b305124aa_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
640697fb17bca815e114b38b305124aa_JaffaCakes118.exepid process 5072 640697fb17bca815e114b38b305124aa_JaffaCakes118.exe 5072 640697fb17bca815e114b38b305124aa_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
640697fb17bca815e114b38b305124aa_JaffaCakes118.exepid process 5072 640697fb17bca815e114b38b305124aa_JaffaCakes118.exe 5072 640697fb17bca815e114b38b305124aa_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
640697fb17bca815e114b38b305124aa_JaffaCakes118.exepid process 5072 640697fb17bca815e114b38b305124aa_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\640697fb17bca815e114b38b305124aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\640697fb17bca815e114b38b305124aa_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 8802⤵
- Program crash
PID:2488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 9202⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5072 -ip 50721⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5072 -ip 50721⤵PID:4064