Analysis
-
max time kernel
131s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:13
Static task
static1
Behavioral task
behavioral1
Sample
6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe
-
Size
359KB
-
MD5
6828f30ad0bc6e1bbd3fd67afa24ebd9
-
SHA1
4fb3cd6028de717756dd111d300ac8d2f7f0d7e9
-
SHA256
9294d9ac18fc397c3c00df5c4a666f7e4f93e624afd0f44f9626c55cf924d7d9
-
SHA512
eca4506fa425160f0a48dbb26f92ead9002e8a24337ebb3034c29af08b1beb51b2264f9473d44cdb932424e61d48e28bf6f9d84ce51768e8bf1a72a3e735d874
-
SSDEEP
6144:78HZLiBye6H49w+zj2B+B/qy9/HjqSVywQ+6KV/meQrJ9SFfL6JR3Cs:IHZLK6HYwSqm/hpH2E3Q7PP9SFfL6D3
Malware Config
Extracted
formbook
3.9
h343
adelphai-llc.com
lzck05xn1.biz
15sheridan.info
bmscustomz.com
djrhub.com
banjoconnect.com
educationtranslators.com
pauldmoch.com
almagspanish.com
wwwjinsha581.com
schrodesign.com
jstello.com
bostontaxextensions.com
schubbink.com
bahis10girisi.info
nevadaclear.com
rajgagantravels.com
emoneyinsurance.ltd
workshop-blog.com
sc-corp.com
enlistlifeline.info
solarsystem-power.com
syxinlvxing.com
thebiglocallegalfinder.com
c6cg.com
nextmedjob.com
foreverwoodworking.com
equifaxsecurity1017.com
gaobo990.com
freeswitch.events
www3940725.com
customwish.net
dishmanager.com
jiemeipa.com
christinecrockerphotography.com
kemikalfactory.com
indonilkaz.com
departmentbusiness.com
manossuaves-loccitane.com
heidihowe.design
lionellimblog.com
mkt9141.com
amrs.ltd
uugan84.com
lifesavingbelt.com
foundationzsslsg.win
urbaniazhgestion.com
footballday-online.com
the-lead.biz
tjptfe.com
impeachthesupremes.com
yanyudingzhi.com
boutiqueseadoo.com
grsdo.com
michelevallier.com
quoterbit.com
net-6.com
designbyivanka.com
tianyazyx.com
rommelarch.net
wjmfz.com
sgpfqjcs.com
kavoshak.com
opebet015.com
niveront.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2652-10-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exedescription pid process target process PID 1108 set thread context of 2652 1108 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4556 1108 WerFault.exe 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exepid process 2652 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe 2652 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1108 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe Token: 33 1108 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1108 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exedescription pid process target process PID 1108 wrote to memory of 2652 1108 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe PID 1108 wrote to memory of 2652 1108 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe PID 1108 wrote to memory of 2652 1108 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe PID 1108 wrote to memory of 2652 1108 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe PID 1108 wrote to memory of 2652 1108 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe PID 1108 wrote to memory of 2652 1108 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe 6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6828f30ad0bc6e1bbd3fd67afa24ebd9_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 10362⤵
- Program crash
PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1108 -ip 11081⤵PID:396
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1108-6-0x000000007484E000-0x000000007484F000-memory.dmpFilesize
4KB
-
memory/1108-1-0x0000000000D60000-0x0000000000DC0000-memory.dmpFilesize
384KB
-
memory/1108-2-0x00000000056C0000-0x00000000056E0000-memory.dmpFilesize
128KB
-
memory/1108-3-0x0000000005CC0000-0x0000000006264000-memory.dmpFilesize
5.6MB
-
memory/1108-4-0x0000000005820000-0x00000000058B2000-memory.dmpFilesize
584KB
-
memory/1108-5-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/1108-0-0x000000007484E000-0x000000007484F000-memory.dmpFilesize
4KB
-
memory/1108-7-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/1108-8-0x0000000005A80000-0x0000000005A8C000-memory.dmpFilesize
48KB
-
memory/1108-9-0x0000000006650000-0x00000000066EC000-memory.dmpFilesize
624KB
-
memory/1108-12-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/2652-10-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2652-11-0x00000000016C0000-0x0000000001A0A000-memory.dmpFilesize
3.3MB