General
-
Target
bc0d9c5250c435e2b08aad396db5fbea_JaffaCakes118
-
Size
381KB
-
Sample
240823-rg1t9aycqf
-
MD5
bc0d9c5250c435e2b08aad396db5fbea
-
SHA1
8ef94d5400b6d10fa683ca6bad7efd19ef2282c3
-
SHA256
267cdbd24ba0c232c80967c7c39f454db0e59b6943836750a5cfbaf2540768d8
-
SHA512
70f75fa30063fdd3b0452e4d0b2936d27de2bfa3c7c5430bb96e532229211ffab167dcf32cfb552463c075b12f01427132c207f530026df710cd4e72174c6269
-
SSDEEP
6144:bDsrpmOp5fjFopppppppp4a5pppppppppppppppppppppppppppppppppppppppQ:bDsdRBGpppppppp/ppppppppppppppp
Static task
static1
Behavioral task
behavioral1
Sample
bc0d9c5250c435e2b08aad396db5fbea_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc0d9c5250c435e2b08aad396db5fbea_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
formbook
3.8
mi
deliris.net
tqcsi-yaran.com
sgrejg.info
vertical-boiler.com
10-56milanstreetmentone.com
electricoslaheroica.com
bombergersarchive.com
177vno.info
hydbad.com
amazonsignage.com
marcelkulhanek.com
purebeautyorganic.com
icerinkcoffee.com
hengshuiyafeng.com
improvereligion.com
hydroponics-aeroponics.com
botmatridee.com
summerfieldalignment.com
xeroaccountantmelbourne.net
babelgrim.net
propbigdata.com
tulane-us.com
cdcyqq.com
theluxury.store
myonlinemarketinged.com
yonlinav666.com
programmingpalace.com
668kb88.com
arkemaclaims.com
purecleansinggels.com
afterweek.com
programmertamako.com
2hpk.com
motivateddear.com
grrman.net
621skinker.net
zaberikush.party
zcgjy.info
binaxkurucesme.net
togdheeruniversity.com
jkdobbins.online
0pe369.com
wwworkin.com
fantasyfootballrocks.com
institutodosono.com
waterheatingservices.com
exo-direct.com
lantacornerresort.com
jameswbarry.com
equifaxsecurizy2017.com
plushflower.info
hendricksware.info
ratclliffconstruction.com
riomink.com
intuilearning.com
c-y.ltd
wvrlxwwofjcuozoj.com
creativestonecorp.com
changingtires.com
aquisii.com
casacurumim.com
honeymoondiet.com
scientificfox.net
kidffm.com
epsycoachez.com
Targets
-
-
Target
bc0d9c5250c435e2b08aad396db5fbea_JaffaCakes118
-
Size
381KB
-
MD5
bc0d9c5250c435e2b08aad396db5fbea
-
SHA1
8ef94d5400b6d10fa683ca6bad7efd19ef2282c3
-
SHA256
267cdbd24ba0c232c80967c7c39f454db0e59b6943836750a5cfbaf2540768d8
-
SHA512
70f75fa30063fdd3b0452e4d0b2936d27de2bfa3c7c5430bb96e532229211ffab167dcf32cfb552463c075b12f01427132c207f530026df710cd4e72174c6269
-
SSDEEP
6144:bDsrpmOp5fjFopppppppp4a5pppppppppppppppppppppppppppppppppppppppQ:bDsdRBGpppppppp/ppppppppppppppp
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload
-
Drops startup file
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-