Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe
-
Size
260KB
-
MD5
aca9506befd5d3cebd9744727c95f19f
-
SHA1
b49ae32e4d165ce72965a1173717d23a8a68a16b
-
SHA256
fa808c78e722a6b3dc9702e455a296fd0b9ada3b049a8e2d5340ad76d3727f61
-
SHA512
5b387c4678d88590d49f46ecd60870d5739fb243dba7ebbd429b920d8e04e6bc84ff494bf868acbc02f50793e419ba64f0e9a401bb078707784e3307aab697fb
-
SSDEEP
6144:CaJsnTdMmLSJ/ChJjNwHXGny6nKNyB2jkRq8efYbxF5Lt1J0:/GdMnJ/KKXKpnky2iHewF5Ld
Malware Config
Extracted
formbook
3.2
ch8
52hiphop.com
goldenraintrading.com
ggdbshoes.store
mysucculentkitchen.com
p-d-d.com
wcsg2018.com
bbb544.com
mybaribox.com
primeroconsalud.com
tildeconilatina.com
pb20000.com
anittreppenlifthilfeok.live
ginebracero.com
dgdgdsgdsgdsgsdgdsg2.com
ymqtq.com
gz1024.info
brandonwalker.info
vast-solutionsmail.com
knightgrandmaster.online
happybwords.com
holmnetworks.com
6870pe.com
ivu6utygv.tech
4dconcaptsusa.com
videogoldproductions.net
repsolmotoroil.com
invest-htbc.com
empoweredbywago.com
pearlstartravel.com
giuromusic.com
1a5sevencolour.men
wonderun.ltd
freexxxsexpics.com
logo8027.com
twistofeverything.com
dietician-consultant.com
axcendhealthpl.com
tropicalcupcakes.com
dib-uae-online.com
sk8geek.net
kalaclub.net
immexpo-aix.com
castlesandcarriages.com
livemusiclover.store
royaleventspartyplanning.com
insuperableness.kim
poaevents.com
tokuyo.net
pasternacksministorage.net
200897.top
sacredritualfoods.com
xn--cck6a9e.com
goodsystemtoupgrades.review
bast33.com
minerrus.com
bolandoideias.net
bigshinesz.com
power-your-brain.net
lintiao.net
googlebusinessclubs.com
wwwhb2146.com
marijuanaattorney.win
innercircles.guide
oescs.com
aldranerz.info
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2680-2-0x0000000000400000-0x0000000000428000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1688 set thread context of 2680 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2680 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2680 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2680 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2680 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2680 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2680 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2680 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2680 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2680 1688 aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aca9506befd5d3cebd9744727c95f19f_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-