Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
c064ec37ffd4521397a436a9d0c3da18
-
SHA1
03ba9be491d49752464ffa0755f0d8926e1925e7
-
SHA256
a308003882167974d1a1f6334f0f9ee1599c50d33ec2883c856de84bf82365f4
-
SHA512
2186f2f8f28efdde84d196468b00f5df27417b65a10ba6589ee0e57d30ffef121ec04973db8ffc7d6ec935e8bdcf0a98d72cad057f131e6caf7c7455d72379ba
-
SSDEEP
24576:f9aok2Jbtfcp5l3E5zXVHjx9NMezB3xmSj:f9aSho45xDvZh
Malware Config
Extracted
formbook
3.9
an
setzesegel.com
freeyrself.com
searchshoppingonline.com
tv16282.info
unitedtur.com
168jlb.com
blockee.info
ryd5.com
kucun108.com
castcmi.red
ufc202.info
goldendawnequipment.com
anlatacaklarimvar.com
szgty.info
realtorlubbock.com
digitalumsetzbar.com
buy9voltblaster.com
naughtytingz.com
phstructuredwater.com
energettic.download
czhb666.com
gestures-in-urban-space.com
stpetevapestore.com
nativenotes.net
jx1nine.loan
resumecommandcenter.com
dropshippingchat.com
totalfreedomzone.info
sojoonghan.com
cpan8.com
lantianruib.com
thetipplebox.com
096586.com
gratitudenation.com
orthodontistwoollahra.com
wigzem.men
birgitweingarten.com
shianlo.com
mobixcx.com
quantifiedworkplace.com
584ljo.info
allthingsfencingbg.com
zghylights.ltd
iscqc.com
mountshasta.solutions
lvica.info
fotowrap.com
mapleskateboard.com
xn--910bp7b04frqaj3ejx6cumd.com
vegg.ltd
xn--efvy07c.com
110468.info
matchdou.com
corrierimt.com
mentalhealthinnovators.com
uemwede.com
digicom.cloud
tamolendo.com
xiaofengsheji.com
inspiredmoneyonline.com
551642.top
ptsmith.com
fastmovertooluk.com
gaertnerremodeling.com
skylod.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2740-10-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2740-14-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2740-19-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3044 set thread context of 2740 3044 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 30 PID 2740 set thread context of 1248 2740 diskperf.exe 21 PID 2740 set thread context of 1248 2740 diskperf.exe 21 PID 2568 set thread context of 1248 2568 help.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2740 diskperf.exe 2568 help.exe 2568 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2740 diskperf.exe Token: SeDebugPrivilege 2568 help.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2740 3044 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2740 3044 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2740 3044 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2740 3044 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2740 3044 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 30 PID 3044 wrote to memory of 2740 3044 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 30 PID 1248 wrote to memory of 2568 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2568 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2568 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2568 1248 Explorer.EXE 31 PID 2568 wrote to memory of 3064 2568 help.exe 32 PID 2568 wrote to memory of 3064 2568 help.exe 32 PID 2568 wrote to memory of 3064 2568 help.exe 32 PID 2568 wrote to memory of 3064 2568 help.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\diskperf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-