Analysis
-
max time kernel
138s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe
-
Size
955KB
-
MD5
91a972c03758ab433f7e7bbde4158e4d
-
SHA1
b31e8bec1883e2f6d69f0ee8cbfed15454e87c8c
-
SHA256
b5d3713200d78ffa108a19cecc8e5f9e27ca778a72eabc4e038821a1e9d56caa
-
SHA512
ccbbfe77338b609f09e5a76f5881e003d4711f8c0e15a9f21fa1b978518bb7a54453be9fa849f3d7d3318bb980c04e8375120965add9fb734b2cc458c438ffca
-
SSDEEP
12288:1umGKSUdXLIXyKQEy3NbeEOIoWhtfvKtEKu0I:omGKndbIrQEy3NbetsVvnKZI
Malware Config
Extracted
formbook
4.1
gbr
serabet.com
galanggroup.com
zweitmeinung-urologie.com
damsalon.com
binliwine.com
lifeladderindia.com
flyingwranchmanagement.com
tripsandturns.com
3headdesign.com
aluminumfacade.com
toprestau.com
facetreatspa.com
periodrescuekit.com
dbaojian.com
altinotokurtarma.com
gkpelle.com
loguslife.com
treatse.com
lghglzcnkx.net
jawharabh.com
planterboxgardener.com
douyzqdsgl.com
bestofselling.com
carbeloy.com
haok.net
mymailtek.com
itsabossthing.com
peoplesdao.com
bhumarealestate.com
otugxixd.icu
amongugadu.com
jemadrekre.com
nikber.com
genomicsmaster.com
firstbyphone.com
arogyamfarms.com
outletamigo.com
musannafashion.com
dtrixxx.com
quickandeasygroup.com
rawhustleapparel.com
care.land
charmingoneboutique.com
xn--fllessang-g3a.com
trendandjobs.online
voxmediation.com
alkawtherabudhabi.com
peeledeye.com
mcgillfamilylaw.com
prokit.net
my-safebaby.com
bookatalia.com
utilking.com
jhondavid.com
onpassivewithval.com
gtelemed.com
playfighterstube.com
bestfreezerstorage.com
kichnpro.com
sanjeevanicreation.com
allturdsmatter.com
picklebarreldillivers.com
clinversity.com
keystogce.com
bistrolartichaut.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/5040-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 5040 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 5040 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 5040 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2564 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 99 PID 2124 wrote to memory of 2564 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 99 PID 2124 wrote to memory of 2564 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 99 PID 2124 wrote to memory of 2952 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 100 PID 2124 wrote to memory of 2952 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 100 PID 2124 wrote to memory of 2952 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 100 PID 2124 wrote to memory of 5040 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 101 PID 2124 wrote to memory of 5040 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 101 PID 2124 wrote to memory of 5040 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 101 PID 2124 wrote to memory of 5040 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 101 PID 2124 wrote to memory of 5040 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 101 PID 2124 wrote to memory of 5040 2124 91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe"2⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe"2⤵PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\91a972c03758ab433f7e7bbde4158e4d_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-