Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe
-
Size
444KB
-
MD5
6ecc25dbd0d4672782217d771f3bd43f
-
SHA1
9c1a9b2cc48e6cbc5add4d1d76b504775b7ce32a
-
SHA256
a2d6cefebcdea60438aa6f581765bbae413499d8dad610045a24aecf8000904f
-
SHA512
e79f1cb1f3f4c6e3b4a5608e1557d374a54cee7af7cd8284ffa7106adbad355c7c9b0027b5946faa3e7dfbf54b14a15d33a90bafef46f8fa7de606560b08034e
-
SSDEEP
6144:/O40SwTgRnh+vWvYxQ75F/SdbGx2Mu72QEeqamy8EGDYgAsSmk7sVbO:240SwERzv775EJGhu72QEBamyH0Smk73
Malware Config
Extracted
formbook
4.1
jw8
nothinggifts.club
wmdaganderbal.com
seeya.group
preventioncatalog.com
werbegut.digital
socialmagnet.net
gernbalouine.com
leilanipow.com
cloudzui.com
neoyummy.com
tsnygf.com
littlegardenmonthly.com
correlationmedia.com
goodbyeerrrors.com
ba-mei.com
skyholdinfotech.com
healthandbeautylocus.com
buyselljetfuel.com
graphitepencil.net
bluebayvrwdmall.com
spotwebs.com
redwin20.club
egosumi.com
sophrologylondon.com
frontsightfocusedlife.com
fitfirephoenix.com
catdegreecatfood.com
dienozo.com
logic.institute
techworld4.com
checklista.net
guanwangsj.com
somacorgroup.com
11188q.com
hanbami.site
zoe101.art
shggly.com
grasipy.com
mediaara.com
dietclass.online
calilifestylerp.com
home-and-auto-quotes.com
rahevi.com
ikulbwfr.icu
rondunlap.com
nakaharaworkman.com
nova-priloznost.com
hyssop.net
missilepop.com
vlact2.com
modagene.com
nursingcurls.com
iuvo.xyz
spine-pros.com
dynamic-racing.com
160820fr.com
creditinnovationsgroup.com
kjpblogu.com
gogule.com
turtlehillproperties.info
grooveperiod.com
courierserviceuefaruk.com
blackmanliving.com
rxxunxv.icu
camonp.info
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/3516-17-0x0000000001890000-0x0000000001BDA000-memory.dmp disable_win_def -
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3516-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exedescription pid process target process PID 2944 set thread context of 3516 2944 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exepid process 3516 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe 3516 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exedescription pid process target process PID 2944 wrote to memory of 3516 2944 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe PID 2944 wrote to memory of 3516 2944 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe PID 2944 wrote to memory of 3516 2944 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe PID 2944 wrote to memory of 3516 2944 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe PID 2944 wrote to memory of 3516 2944 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe PID 2944 wrote to memory of 3516 2944 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe 6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6ecc25dbd0d4672782217d771f3bd43f_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-