Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe
-
Size
529KB
-
MD5
67d6cc23b3d706b688e2fc2bf86adeb2
-
SHA1
129ca4404eeb7064d6c8f0ac6902004c103b1955
-
SHA256
aeb152965dfacf939b0329628a69d1c5297bbae7090ee6aa40458aecc49613cc
-
SHA512
0268bed3248babf5202f42f84e9403cc5b53db0857ee2a9f1e31f82c8c982c250d5a5f5fb14e622a30e04c6cf5de462b388a8ada64dd4bfb040b936d3ae7c47e
-
SSDEEP
12288:17Q8838bm5PmPZvTH8T9xRAw7WXymM4aCRj1:omPZAT9Dp7WCmM4r
Malware Config
Extracted
formbook
3.9
di
countdown-mirage.com
fusion11tyler.com
xn--ccklb4p0b9c2f.site
tasucusahilemlak.com
edubcbe.com
phunulamdep.today
hsbei.com
molly20.com
creditcardtalks.com
simonadecors.com
sefakarabacak.com
plusong.com
mrcoursereview.com
dolphinaping.site
dgytwh.com
lestoilesart.com
dadshow.net
shinhanconvention.com
check-that-notice-works.com
fingerlakesprowashing.com
indica.energy
charles-friedel-consulting.com
videoai.ltd
kocaeligelinlik.com
dekkorart.com
chrouti.com
atlantaspark.win
aroma-event.com
ericolex.com
cyclingclothinglong.com
yogo360.com
theglasspipefactory.com
eliosbank.com
alboxproperty.com
nanologyllc.com
kayokoyoshioka.com
duniyatechnologies.info
techgtx1070.com
sassyapplecreations.com
espelhoaliado.com
ffseletricaehidraulica.com
mbodu.com
saryanlinksafaris.com
dak92.com
100csoft.com
massivejunglist.com
gettingbuffwbee.com
4e07.com
thelostgirlsco.com
ineedwonga.com
karmfirm.com
startmakingmoneyonline.today
ivprod.com
n0g7ms0.info
firealarmsurrey.com
chyfly.com
epic-pediatrics.com
alphaatcg.com
vidaorganicaclub.com
kellygallery.net
core-rebirth.com
jugend.center
elimtherapy.com
amitabreastsurgery.com
ajexin.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1972-19-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exedescription pid process target process PID 2988 set thread context of 1972 2988 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exepid process 2988 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe 2988 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe 2988 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe 2988 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe 1972 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exepid process 2988 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exedescription pid process target process PID 2988 wrote to memory of 1972 2988 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe PID 2988 wrote to memory of 1972 2988 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe PID 2988 wrote to memory of 1972 2988 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe PID 2988 wrote to memory of 1972 2988 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe PID 2988 wrote to memory of 1972 2988 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe 67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\67d6cc23b3d706b688e2fc2bf86adeb2_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1972-19-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2988-8-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-1-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-7-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-14-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-15-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-4-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-5-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-6-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-3-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-2-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-10-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-9-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-11-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-12-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-13-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-16-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-17-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-18-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2988-0-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB