Analysis
-
max time kernel
130s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe
-
Size
781KB
-
MD5
a53ca5c60cc21e40dd31a7a7a68ba74b
-
SHA1
55f98b7940c216decffbee9ea0927334f8d56785
-
SHA256
8c5a90a4c4470d05fff7757920aa0a8bf56edab04f4eb926ba789652f1bfc74c
-
SHA512
01c393ea54de3a5b20ca08820be67a2dcbd9bd99bb993f8293a3c6ab283aab096b362e569dd33600fece8acec9ec77a4a62dfe25290d96851d99b198a4c38fdd
-
SSDEEP
12288:jsANYT/rTbYnFBznBjFcxN7j2/x4Z+7zTu2vRiZi6quXNLqB9pLoOn/fIHwkEN+n:D8/rTsfeiiZFqRjn/fgwkEN+vnVr1X
Malware Config
Extracted
formbook
4.1
wle
peterwangofficial.com
bhjchouse.com
belladermalotion.com
rickmccomas.com
bigtime80s.com
wilmington-pestcontrol.com
take2ya.com
bibakkitap.com
livelifemagazine.com
acp118.com
myneuro-gym.com
kolornaire.com
edgeband-china.com
aogiworld.com
svcor.net
112wp.com
malaysiawhitecoffee.com
packers-vsvikings.com
chintels.net
stefan.tools
teachermaryam.com
freeinfom.xyz
podcaserz.com
725403.com
glencoreinternal.net
statirasin.com
sesliefsanem.com
truloqal.com
active-connector.xyz
mohamedmashhor.com
zennode059s.ovh
rapmu.com
sazshop.com
promoteyourpassionnow.com
pratosaudavel.com
dilauto-a.online
floridaevictionlaw.com
agreementdoc.com
iishon06.com
oregonover65.com
xn--fiqs8so3j246b.online
happenutem.com
dxnewradio.com
uyhams.com
deliverymail-promocija.com
everydaycollars.com
a273.xyz
basharalkhatib.com
ibepeter.com
mobilevidpro.com
generaciondonramon.com
getmermelada.pro
richchristians.com
856379631.xyz
paypalrevision.com
reaperskull.com
ryanssportsbarpattaya.com
shopwanderandwilderness.com
walkiriastore.com
jlvirtualassistant.com
michaeljfamoso.com
imertek.com
unbrokenpromises.pro
pejalanlaki.com
jimwheelerrealtor.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4664-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2308 set thread context of 4664 2308 a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4664 a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe 4664 a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2308 wrote to memory of 4664 2308 a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe 99 PID 2308 wrote to memory of 4664 2308 a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe 99 PID 2308 wrote to memory of 4664 2308 a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe 99 PID 2308 wrote to memory of 4664 2308 a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe 99 PID 2308 wrote to memory of 4664 2308 a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe 99 PID 2308 wrote to memory of 4664 2308 a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a53ca5c60cc21e40dd31a7a7a68ba74b_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-