General
-
Target
c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118
-
Size
247KB
-
Sample
240828-3pkc1svaml
-
MD5
c7db2f2dc554de12f13d17e18475c84d
-
SHA1
a361998306839cd8eac711734232c049c4471e81
-
SHA256
55e4fe94a51a73a2201d449c54315c5428a4a7a2e778cf33ba387bd0b158e6df
-
SHA512
699b49da272a1bcab2ffc73ad46192d99a3857ad1e716cf3f53097d1c29b11001109a8408e4a5083a3ade51658dc37f89d01ed96c448d885fad73de672e98dfc
-
SSDEEP
6144:iOKil6SOuF+Phe4v0Xt8Jy4UskF5HIxU0q8BhcHNs33m:/wG+J1vE8JyFi7dBqHmH
Static task
static1
Behavioral task
behavioral1
Sample
c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
formbook
3.9
bi
frspin.com
voron.black
in296.com
exportar.biz
19138537.com
de-play-games.com
suitmine.com
obedenie.com
inventoswiki.com
ahchoices.com
hushopgawd.com
uvalleconcrete.com
milospetstuff.com
vip-ships.com
huiyuetech.com
realestatewithswann.biz
investbuycoin.com
wememebusiness.info
stringapp.net
monikawaronska.com
rexchangeloans.com
alwaysavailabletowing.com
dg6-edelvais-kk.com
milixianquan.com
cqjiruan.com
a2k4po9w.biz
dengguangyun.com
dimanjj.com
webmail-comtechsystems.com
the-future-of-activation.com
onva.online
superiorcollision.net
peruviajesclub.com
susa-entertainment.com
trendsoftus.com
gamevanilla.com
ethicalserviceslimited.com
haichenge.com
houseofhardbodies.com
nutricionlindavista.com
drivesafetv.com
littlegiggleshomedaycare.com
growplease.com
skysedgemusical.com
louisoadams.com
global-dkt.com
webhostkitchen.com
classicmustanggirls.com
chenshoubing.com
sedwicksir.com
patientsplan.com
mpuhilfe.tips
worldlanguagepodcasting.com
lisablackwellwrites.com
edzxy.com
johannayr.com
irmarepairs.info
mountbougie.com
bitchoffnow.com
heartchurchsd.com
kusn1.info
bisolherbal.com
kicksomfire.com
kingglazers.com
scaker.com
Targets
-
-
Target
c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118
-
Size
247KB
-
MD5
c7db2f2dc554de12f13d17e18475c84d
-
SHA1
a361998306839cd8eac711734232c049c4471e81
-
SHA256
55e4fe94a51a73a2201d449c54315c5428a4a7a2e778cf33ba387bd0b158e6df
-
SHA512
699b49da272a1bcab2ffc73ad46192d99a3857ad1e716cf3f53097d1c29b11001109a8408e4a5083a3ade51658dc37f89d01ed96c448d885fad73de672e98dfc
-
SSDEEP
6144:iOKil6SOuF+Phe4v0Xt8Jy4UskF5HIxU0q8BhcHNs33m:/wG+J1vE8JyFi7dBqHmH
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-