Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
9aed70a63a9b5ba11bd1f44177f1a1ad_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
9aed70a63a9b5ba11bd1f44177f1a1ad_JaffaCakes118.exe
-
Size
284KB
-
MD5
9aed70a63a9b5ba11bd1f44177f1a1ad
-
SHA1
3dcd99b61503cc69cdcddeb783f746da5f167edb
-
SHA256
fa580f04db69517d1b9f7f9e1d88367e89645f90d8eb0698c4793389d3aabda8
-
SHA512
2d9edf0d7f5ccdebf27690a5269a87334cbe8d64a676e9b3ee23c191cf3449387446c7968cbfa53a8bc16d3becc5395a1b370a6e633c35e2dbdddc03909f110c
-
SSDEEP
3072:VuH0Vy0up0NMjbcORKCwNETwoWqcFysVKHxnIZJpS9eqsqcD4JoMf:EHmy0dNMjQDCwNETw359axnIZb6sMJh
Malware Config
Extracted
formbook
3.8
css
fnxmedia.com
joakimnoahonline.com
prorokers.net
otfego.info
lucao20201.com
1q4y6.info
carefullyhandmade.com
walktalkbaby.com
carpetcanvas.win
boyzpro.com
the-one-wave.com
cbd-oil.online
uiiuii.net
securitycameraadvisor.com
phillipsfarmstead.com
vssuq.info
huasitee.com
bitandbreakfast.com
poiuyt.info
haterstyle.com
14joyst.com
kameraliortam.net
yilegao169.com
xngxdc.com
rudelkonzept.com
zensheep.net
ogon.biz
xaiyaizai.com
bzyc166.net
casadecampowedding.com
vabomeredosing.com
yuricoin.com
get-luxuryvoyages.sale
rethinkedimplementation.info
aodaikhoanguyen.com
revitalifeinternational.info
mamutprint.com
anhru.win
bavuongmu.com
photoprotective.com
knwledg.com
sogarotas.com
18plus.toys
iziconnexion.info
montsaintaignan.immo
dirty-dreams.com
yxjfhb.com
dthotpot.com
tjwps.com
connecticutstudent.loan
yypgh.com
bitcoinpepe.com
oceanwavevideo.com
testrfrostdomain.com
iglhautallrad.com
hibbk.net
trans-cash.info
554987.top
steambattle.net
managementtech.info
leavenworthdirectory.com
screeching-kite.com
privateblockchain.email
bjcnganjixk1.com
caliaypares.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/540-3-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Program crash 2 IoCs
pid pid_target Process procid_target 2556 540 WerFault.exe 82 1624 540 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 540 9aed70a63a9b5ba11bd1f44177f1a1ad_JaffaCakes118.exe 540 9aed70a63a9b5ba11bd1f44177f1a1ad_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 540 9aed70a63a9b5ba11bd1f44177f1a1ad_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aed70a63a9b5ba11bd1f44177f1a1ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9aed70a63a9b5ba11bd1f44177f1a1ad_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 7762⤵
- Program crash
PID:2556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 7922⤵
- Program crash
PID:1624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 540 -ip 5401⤵PID:60
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 540 -ip 5401⤵PID:4344