Analysis
-
max time kernel
143s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
30/07/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe
-
Size
747KB
-
MD5
68e0117d2b14f9b4db44063953c9f028
-
SHA1
0b2751b17a9131a9fc636a7dd5136ff8c6951049
-
SHA256
54c0138d6a0dbd5967d7cf51eb753b29aa1fd72a85152285bd22347fa6654022
-
SHA512
cb3ebc8964151ccdfd0ee0f78dc1daa7dadc3ce1fb4eee1d291ee306894a538167374d4750943dd2265407e92429ada74da3169600716215e9b4f74764c939c6
-
SSDEEP
12288:bxojH5jdL/KyCR7PqRo2YQLa3RFC7cvoLTKwnfzOw3Ue8:+ljBKnRIIQOhKcCTKI3
Malware Config
Extracted
formbook
4.1
3nk4
teresaanaya.com
byronhobbs.com
altiizgara.com
reignsponsibly.com
kanistones.com
clickpk.site
aizzainvestments.com
bpqbq.com
openfitxbstretch.com
blackvoicesstore.com
yousefzaid.com
verdeaccounting.com
independentthoughtshow.com
fainlywatchdog.com
elreventondelsabor.com
spiceyourfood.com
1277hb.com
cesttoni.com
portalngs.com
turismoplayas.com
futurevisiondubai.com
grandpaeddiesbbq.com
tenkillersolutions.com
laagerlitigation.club
kyleandabbey.com
badassbae-bae.com
qraieahckby.com
moskvaoptom.net
autoserviceprovider.com
foodrhyme.com
andrew-vencetore.com
clasimovie.com
universitylook.com
123ufabet.club
bucearte.com
mytreasurecare.com
tenstarcleaning.com
iluvpictures.com
emvision.online
thepurplestrip.com
msrawyh.com
viiokey.com
davidgrayceramic.art
letsdiscover.coach
codingintamil.com
luxtourbus.com
appsofbuffalo.com
lunacardenas.com
aurifexinsurance.com
turkishhouse.restaurant
pureanddutch.com
thechurchboyapparel.com
eyebeamblue.com
upperbunk.com
jsruiyang.com
hillarykelly.com
stanleys.website
2r738euwdfhijn.com
luma-luxury-matchmaker.com
familycarehd.com
securitybyicon.com
myveeta-talents.com
nubianartstudio.com
liancaiwangv2.com
trulex.xyz
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4908-4-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4360 set thread context of 4908 4360 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4360 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 4360 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 4908 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 4908 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4360 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4360 wrote to memory of 4908 4360 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 84 PID 4360 wrote to memory of 4908 4360 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 84 PID 4360 wrote to memory of 4908 4360 68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68e0117d2b14f9b4db44063953c9f028_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-