Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe
-
Size
268KB
-
MD5
850cc1c75063ca92d970aa3013a3402c
-
SHA1
6a4056de057bb0c797fb81d239080376489c6d19
-
SHA256
f018d2a3fed9a8a2a93aa145a931d71e7a3ccb400f8c6c4bd9767584ee15f18f
-
SHA512
41433d8c8d8ab64aa31c7f32d67e2f35d491b67d718a308b5b58c599689d634696b5f6f0b4093e68e65a5899e2c0046b6d8bc24684f40f92f99f5f3fcf252a48
-
SSDEEP
6144:3c+h6TZfrgYGczjWRc3UXEkc6RIgTXDuJiAW589RyI+i:1qMYZW3jcGIMXCJ5W5qER
Malware Config
Extracted
formbook
3.7
ch22
zexiyikang.com
diniharidinar.com
mgiuj.com
marunoco.com
webdownloadmanager.com
jiachuangkegongmao.com
markoemosy.online
coreroles.com
victoryautoserviice.com
jlsichuang.com
lllgxu.info
webdesignexperts.today
escolajaumevicensvives.cat
libbeyiran.com
musikanlage-vergleich.online
partners4solutions.com
makrobet529.com
entenmanns120birthday.com
jianyelvcai.com
deltaschilders.com
huroltal.life
switch-currency.com
levellistings.com
stocktimings.net
renze360.com
enlightenedpetpeople.com
fighterspalace.com
gidonlinekino.net
damorelunardi.com
erpchennai.com
equitilt.com
cjqmno.info
haenb.com
bendigofolkclub.com
nootrinity.com
agvip67.com
expertbillcutters.net
huskyfuelforlife.com
szhwculture.com
lansingfinancialplanner.com
artisunlighting.com
trustedfinancenews.info
clashroyalegemhackzone.com
koschain.com
rddht.com
mdjmtgh.com
wwnokp.info
artplatnette.net
iwasborninczechoslovakia.com
irgdeagxpy.click
brainfrieze.net
fourmenlodge.com
merchantmemberservices.com
bingobonga.com
zibalux.com
siris24.com
switch1988.com
preparedtraffictoupgrade.date
garminpay.com
tracyamstad.com
threeblackducks.net
cng-euroqe.com
betterqualitytreatments.com
554930.top
bafby999.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2060-2-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2392 set thread context of 2060 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2060 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2060 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2060 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2060 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2060 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2060 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2060 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2060 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2060 2392 850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\850cc1c75063ca92d970aa3013a3402c_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-