Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
30/07/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe
-
Size
747KB
-
MD5
68e0117d2b14f9b4db44063953c9f028
-
SHA1
0b2751b17a9131a9fc636a7dd5136ff8c6951049
-
SHA256
54c0138d6a0dbd5967d7cf51eb753b29aa1fd72a85152285bd22347fa6654022
-
SHA512
cb3ebc8964151ccdfd0ee0f78dc1daa7dadc3ce1fb4eee1d291ee306894a538167374d4750943dd2265407e92429ada74da3169600716215e9b4f74764c939c6
-
SSDEEP
12288:bxojH5jdL/KyCR7PqRo2YQLa3RFC7cvoLTKwnfzOw3Ue8:+ljBKnRIIQOhKcCTKI3
Malware Config
Extracted
formbook
4.1
3nk4
teresaanaya.com
byronhobbs.com
altiizgara.com
reignsponsibly.com
kanistones.com
clickpk.site
aizzainvestments.com
bpqbq.com
openfitxbstretch.com
blackvoicesstore.com
yousefzaid.com
verdeaccounting.com
independentthoughtshow.com
fainlywatchdog.com
elreventondelsabor.com
spiceyourfood.com
1277hb.com
cesttoni.com
portalngs.com
turismoplayas.com
futurevisiondubai.com
grandpaeddiesbbq.com
tenkillersolutions.com
laagerlitigation.club
kyleandabbey.com
badassbae-bae.com
qraieahckby.com
moskvaoptom.net
autoserviceprovider.com
foodrhyme.com
andrew-vencetore.com
clasimovie.com
universitylook.com
123ufabet.club
bucearte.com
mytreasurecare.com
tenstarcleaning.com
iluvpictures.com
emvision.online
thepurplestrip.com
msrawyh.com
viiokey.com
davidgrayceramic.art
letsdiscover.coach
codingintamil.com
luxtourbus.com
appsofbuffalo.com
lunacardenas.com
aurifexinsurance.com
turkishhouse.restaurant
pureanddutch.com
thechurchboyapparel.com
eyebeamblue.com
upperbunk.com
jsruiyang.com
hillarykelly.com
stanleys.website
2r738euwdfhijn.com
luma-luxury-matchmaker.com
familycarehd.com
securitybyicon.com
myveeta-talents.com
nubianartstudio.com
liancaiwangv2.com
trulex.xyz
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2780-5-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2704 set thread context of 2780 2704 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2704 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 2780 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2704 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2780 2704 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 31 PID 2704 wrote to memory of 2780 2704 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 31 PID 2704 wrote to memory of 2780 2704 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 31 PID 2704 wrote to memory of 2780 2704 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-