Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe
-
Size
837KB
-
MD5
772818fce7b10874f4966be5a8cd7c27
-
SHA1
a60926d4ee84fe6da426a6165ca6f02ef6e1fbbf
-
SHA256
6fd8fde47bfdecf4c5fa63b708ef5f28ba0b9417eab79ac395cd6bf068eedcc7
-
SHA512
bf76e0c30b5ab8e77c281482cf78724174057370bc05911f6f574c62b8d3904be4822a9e54287eda813a84a0038dbb038f356ea9696dd931b260b1937509bd06
-
SSDEEP
24576:81KWCAI+LdOTOi8r+/ZS5TPhPJfQV9wMok:kbIsOTOiBZSpPhG9wMT
Malware Config
Extracted
formbook
3.8
dg1
pilatesmania.life
5bcoin.com
ammowillcall.com
quickwinz.market
terigele.com
sohotoken.com
tielingwww.site
lz2b3.info
norisc.com
digitalkonsultan.com
925manbetx.com
laricipark.com
quantum7nutrition.com
xceedcg.com
hanagel.com
cane91.download
iotadocker.com
brackenupholstery.com
erfolg-sichern.online
bihuorg.com
julieannemonroe.com
plazalascanas.com
howtodobooks.com
tamsonphotography.city
come-and-read.com
greenbirdeventsnj.com
globalcurrency.money
sunflowersecrets.com
xishencun.com
marcjacobsoutletco.com
creep.directory
studionineyoga.com
yexe.ltd
yz330.com
style-still.com
htdxxv.info
desatlogoblitar.com
kaptenkerang.com
lgh-light.com
rapidproto-expert.com
nail-boo.info
tamvandatranghuy.com
lfmean.com
energgy.tech
vj8ehq.info
ucesi.com
allfiwaterjet.com
nfjqbgja.com
wwnjx.com
03k8qo.info
united-ush.com
www231789.com
ceips.info
888coins.info
tcamersfoorteemvallei.com
healthyphy.com
moisturemasks.com
skepscape.com
chameleon-storytelling.com
shopbrunchwiththegirls.com
swty00555.com
cyanoestudio.com
lcoise.men
seaholidays.info
elsbouse.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2872-12-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/2040-2-0x0000000000600000-0x0000000000630000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
Processes:
772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exedescription pid process target process PID 2040 set thread context of 2872 2040 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exepid process 2872 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2040 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exedescription pid process target process PID 2040 wrote to memory of 2872 2040 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe PID 2040 wrote to memory of 2872 2040 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe PID 2040 wrote to memory of 2872 2040 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe PID 2040 wrote to memory of 2872 2040 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe PID 2040 wrote to memory of 2872 2040 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe PID 2040 wrote to memory of 2872 2040 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe PID 2040 wrote to memory of 2872 2040 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe 772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\772818fce7b10874f4966be5a8cd7c27_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-