Analysis
-
max time kernel
132s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 08:57
Static task
static1
Behavioral task
behavioral1
Sample
ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe
-
Size
268KB
-
MD5
ae99103e5ce4607dceddd757d78538df
-
SHA1
1bba604a228afa3acff5d06f3e2b4b1f9b833d85
-
SHA256
93e98542a60cdc289195a75af47998995b83a01c880a9647d1171be104ab970b
-
SHA512
df6c0078fccd05b60ab46a9b26d2761ea3290500bd1f611678ea9a3e2cfdd7064a44b1f4ec3f95e2ec2e82d6253c733bc8ff9904b21558770335f45e16868a1a
-
SSDEEP
6144:blRikI9uFJXo1hCoKJ3c9eWhWzlFF2Yl:JHI9ujXohCoWM9eoWz/FD
Malware Config
Extracted
formbook
3.6
ch24
rrd-wbd.com
astonherencia.com
socialsurveymaker.com
ofthefamily.net
hiza.ltd
xygczs.com
bjxeb.net
equifaxsecurikty2017.com
rongxiangmifeng.com
atelierbunnybunny.com
xn--fiq316n.com
creativsec.com
miaspiro.com
fantasi.info
donworrycredit.com
mistyroads.com
sxjhyy.com
lullv.info
squarewaycall.net
vshark.net
lutzfriedrich.com
stealthadvocates.com
justbasins.com
bingadsguide.site
pictonrm.com
llo88oll-kitty.com
ransont.world
283manbet.com
businesslinks.biz
viaengine.com
drinkandbeyondoutlet.com
rubbishcollectionlewisham.ltd
xn--ok0bl1wj9dn4hbuq.com
comercialvector.com
yourtv.online
cryptecs.biz
homeinthehemlocks.com
portici.store
onyxtoken.com
freejazzpizza.com
findurfreedomonline.com
gidopark.com
skissur-production.com
jorgmar.com
elitebasketballleague.com
trendingcult.com
organicbiodefensoresdegaia.com
codeblack.online
datnhadongnai.com
225766666.com
pargankala.com
magicaffiliatehub.com
rubyhydephotography.com
freepaymentservices.com
harriettawalterson.net
eliteipage.com
nabilhourani.com
tsolbook.net
bigapps.tech
danrelates.com
confusedmale.com
melyphoto.site
xn--jpra5268b.com
rersm.loan
exisceztim.info
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2660-3-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4252 set thread context of 2660 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe 2660 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4252 wrote to memory of 2660 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe 93 PID 4252 wrote to memory of 2660 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe 93 PID 4252 wrote to memory of 2660 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe 93 PID 4252 wrote to memory of 2660 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe 93 PID 4252 wrote to memory of 2660 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe 93 PID 4252 wrote to memory of 2660 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe 93 PID 4252 wrote to memory of 2660 4252 ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae99103e5ce4607dceddd757d78538df_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-