Analysis
-
max time kernel
137s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe
-
Size
340KB
-
MD5
b6a71f32c73d5392dc3dcf5ebfd9f11a
-
SHA1
82af158a9984597cfb71570ff87f52421e1b0d2c
-
SHA256
6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1
-
SHA512
aa6b1bc9ff70689c0740683c0858a48b348c4d9f018c3ca11745dcb74480efb89b89dc002159576cd0c461ff9b2de320729a3a40f984a83a8698a4e99d4f959b
-
SSDEEP
6144:D3yaVwC1pYMTJCTmjd3M3YqUoqNgtDK5BGN1BOpF1d8EWkFRTlV1erRSaYv0P3:bVwMmgJEmjd4/UoqNggDGNaFGEWO1edH
Malware Config
Extracted
formbook
4.1
c239
shareourjesus.com
lavictoriaesdetodos.com
helpfulproductions.com
waggonerplastics.com
skipouya.com
everyoneshoroscope.com
winterstokeview.com
gutsyhomemakers.com
redstatesdigital.com
themacmeliusshow.com
beautybarnantucket.com
wearetwo-a.com
thenutritionessentialist.com
tapsiwadhwa.com
jundicompany.net
gobocawest.com
woodking.space
elegantap.com
2ndoss.info
ebay1111.com
libloc.info
rembiu.com
myenterprisesdesk.com
advancedcaremedical.com
paintingservicespune.com
sz128129.com
projkles.com
hermonexgold.com
xn--1000-3ua.com
greatplainscoffeecraze.com
educoinxchange.com
elclubswinger.com
lacrimis.com
extendedsecurityservices.com
district9asda.com
weidianmc.com
richgladiator.com
babehou.com
fastoffer.house
ttxxremote.icu
naigves.com
kamalaharriswillneverbevp.com
programmerjobsnow.info
hezlee.com
zfstyz.com
weblovetn.xyz
comadison.com
bestpadelcourt.com
coviders19.com
takeandpressplay.com
mangajohosta.com
angelaahbzanderson.com
stanleywatches.com
studiobyshirls.com
cloudengineer360.com
heavenlybluepool.com
evargasdev.com
140b.xyz
michaelvancebromfield.com
emotionalgun.club
mocingbird.solutions
ace1inc.com
camwoobats.com
leadconverters.info
qatib.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2700-2-0x00000000001C0000-0x00000000001EF000-memory.dmp formbook behavioral2/memory/5012-3-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 5012 2700 b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5012 b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe 5012 b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2700 wrote to memory of 5012 2700 b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe 84 PID 2700 wrote to memory of 5012 2700 b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe 84 PID 2700 wrote to memory of 5012 2700 b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe 84 PID 2700 wrote to memory of 5012 2700 b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe 84 PID 2700 wrote to memory of 5012 2700 b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe 84 PID 2700 wrote to memory of 5012 2700 b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-