Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 21:53
Static task
static1
Behavioral task
behavioral1
Sample
735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe
-
Size
733KB
-
MD5
735e84ac1205e9dd7816c85f7706afb4
-
SHA1
2894b5d49235df4845f15477d835c9b78ec08e72
-
SHA256
dd97d41dbcea146c66d6a62f152d2b86bd60122b920d17eb11c8d639d338c779
-
SHA512
f3b14d69d62ca59693f72369126c5419188a5f7f33f4d188f439021aff5b8f095593d9ab8a8867b17dfda0ef7eac80287451fee33882ffd460535642fdc46d99
-
SSDEEP
12288:lF8UUt63DaFFRTImFKqQg7O1W/5N6NspDeaYUEuE5:lTUt63DaFFYqOMRN6IDf7e
Malware Config
Extracted
formbook
3.0
ma
painmedos.com
sp5ce.com
woldtv.com
zpc.ink
makrobet829.com
ar868.com
hakuneko.com
8-lab.info
test-gopalsep14.store
latiendaimportados.com
bakerysweetcheeks.com
nwklb9ze2p0.biz
startosizmir.com
sterilizedknqwp.download
rriivernyile.com
managementcover.site
beach.expert
huamzw.com
emojis3d.com
pissonagrave.com
taretan.com
memography.net
keepitonthedl.net
strategictraffics.com
tv17343.info
xhtd153.com
citoyensunis.com
racoplay.com
beafindnewcarfan.live
dwahproperty.com
globalchaseservices.com
djjcontractors.com
gamescrush.com
porscheoflakewood.com
tv17715.info
www38585555.com
mmorpg.today
fastandready.net
healthminderportal.com
trustringo.win
amanijaramoga.com
dietarysuppliment.com
micochedeocasion.com
mskhk.net
xiaohuoche.info
nwaika.info
tandem-medical.com
shinobusoejima.com
crimepetrol100.com
ontrackcconsulting.com
reparacionesgerpi.com
tycaplinger.com
fbstables.com
plancific.com
5y7jtg.com
7od80z0.info
hosibuton.com
zzevr.info
liangpinyi.com
trackmylifestyle.com
foundationsdog.com
bbaesthetics.com
beautecryo.com
gangabucks.com
prfitvxnfe.info
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2140-3-0x0000000000400000-0x0000000000428000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exedescription pid process target process PID 4652 set thread context of 2140 4652 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exepid process 4652 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe 4652 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe 2140 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe 2140 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 4652 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exedescription pid process target process PID 4652 wrote to memory of 2140 4652 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe PID 4652 wrote to memory of 2140 4652 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe PID 4652 wrote to memory of 2140 4652 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe PID 4652 wrote to memory of 2140 4652 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe PID 4652 wrote to memory of 2140 4652 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe PID 4652 wrote to memory of 2140 4652 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe 735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\735e84ac1205e9dd7816c85f7706afb4_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-