Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 18:46
Static task
static1
Behavioral task
behavioral1
Sample
b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe
-
Size
485KB
-
MD5
b49ae4462f5ed9597f6f3646091c707a
-
SHA1
0346b7e8e054c151735647d469f265028019bd2e
-
SHA256
90e6f10a0caabd250a9d43d12982b5861ec160177d99ad07ce68bd18d103736c
-
SHA512
bbecb4e15aa7bf37b440ab87d5aaaa1e7576aecd901da5e108113dc9dbd893c02eff69c205b33fe0996ab104cfb7bb909c012cc3383f766ab3180cf0d924877b
-
SSDEEP
6144:nKmCLXDlnhuQ+3HwOcc0WYHMTZPPPO1/E9aPEUEN75kpr4j6lrG1yXUKqLe:S3occ0W1TZPPPOlcU675WlrGwXc
Malware Config
Extracted
formbook
4.1
rv9n
olivia-grace.show
zhuwww.com
keiretsu.xyz
olidnh.space
searuleansec.com
2fastrepair.com
brooklynmetalroof.com
scodol.com
novaprint.pro
the-loaner.com
nextroundscap.com
zbwlggs.com
internetautodealer.com
xn--tornrealestate-ekb.com
yunjiuhuo.com
skandinaviskakryptobanken.com
coxivarag.rest
ophthalmologylab.com
zzzzgjcdbqnn98.net
doeful.com
beatthebank.fund
deposit-pulsa2021.xyz
uptownsecuritysystems.com
thegroveonglendale.com
destinationth.com
healthcareuninsured.com
longhang.xyz
ypxwwxjqcqhutyp.com
ip-15-235-90.net
rancholachiquita.com
macblog.xyz
skillsbazar.com
beatyup.com
academiapinto.com
myguagua.com
fto8y.com
ohioleads.net
paravocebrasil.com
thecanyonmanor.com
acu-bps.com
comunicaretresessanta.net
schwa-bingcorp.com
discountcouponcodes-jp.space
kufazo.online
metaverge.club
800car.online
brendanbaehr.com
garfieldtoken.net
secretfoldr.com
13itcasino.com
marketingatelier.net
computersslide.com
marcastudios.com
thestreetsoflondon.life
maintaintest.com
cronicasdebia.com
apm-app.com
sepulchral.xyz
lodha-project.com
theartofsoulwork.com
swimminglessonsshop.com
klarnabet.com
control-of-space.net
heliumathletic.com
cjspizza.net
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2664-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2652 set thread context of 2664 2652 b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2664 b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2664 2652 b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2664 2652 b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2664 2652 b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2664 2652 b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2664 2652 b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2664 2652 b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2664 2652 b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b49ae4462f5ed9597f6f3646091c707a_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-