Analysis
-
max time kernel
17s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe
-
Size
247KB
-
MD5
c7db2f2dc554de12f13d17e18475c84d
-
SHA1
a361998306839cd8eac711734232c049c4471e81
-
SHA256
55e4fe94a51a73a2201d449c54315c5428a4a7a2e778cf33ba387bd0b158e6df
-
SHA512
699b49da272a1bcab2ffc73ad46192d99a3857ad1e716cf3f53097d1c29b11001109a8408e4a5083a3ade51658dc37f89d01ed96c448d885fad73de672e98dfc
-
SSDEEP
6144:iOKil6SOuF+Phe4v0Xt8Jy4UskF5HIxU0q8BhcHNs33m:/wG+J1vE8JyFi7dBqHmH
Malware Config
Extracted
formbook
3.9
bi
frspin.com
voron.black
in296.com
exportar.biz
19138537.com
de-play-games.com
suitmine.com
obedenie.com
inventoswiki.com
ahchoices.com
hushopgawd.com
uvalleconcrete.com
milospetstuff.com
vip-ships.com
huiyuetech.com
realestatewithswann.biz
investbuycoin.com
wememebusiness.info
stringapp.net
monikawaronska.com
rexchangeloans.com
alwaysavailabletowing.com
dg6-edelvais-kk.com
milixianquan.com
cqjiruan.com
a2k4po9w.biz
dengguangyun.com
dimanjj.com
webmail-comtechsystems.com
the-future-of-activation.com
onva.online
superiorcollision.net
peruviajesclub.com
susa-entertainment.com
trendsoftus.com
gamevanilla.com
ethicalserviceslimited.com
haichenge.com
houseofhardbodies.com
nutricionlindavista.com
drivesafetv.com
littlegiggleshomedaycare.com
growplease.com
skysedgemusical.com
louisoadams.com
global-dkt.com
webhostkitchen.com
classicmustanggirls.com
chenshoubing.com
sedwicksir.com
patientsplan.com
mpuhilfe.tips
worldlanguagepodcasting.com
lisablackwellwrites.com
edzxy.com
johannayr.com
irmarepairs.info
mountbougie.com
bitchoffnow.com
heartchurchsd.com
kusn1.info
bisolherbal.com
kicksomfire.com
kingglazers.com
scaker.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2384-13-0x0000000000080000-0x00000000000AA000-memory.dmp formbook behavioral1/memory/2384-16-0x0000000000080000-0x00000000000AA000-memory.dmp formbook behavioral1/memory/2384-21-0x0000000000080000-0x00000000000AA000-memory.dmp formbook -
Executes dropped EXE 1 IoCs
pid Process 2384 svhost.exe -
Loads dropped DLL 1 IoCs
pid Process 2616 c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2616 set thread context of 2384 2616 c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe 29 PID 2384 set thread context of 1184 2384 svhost.exe 20 PID 2384 set thread context of 1184 2384 svhost.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2616 c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe 2384 svhost.exe 2384 svhost.exe 2384 svhost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2384 svhost.exe 2384 svhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2616 c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe Token: SeDebugPrivilege 2384 svhost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2384 2616 c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe 29 PID 2616 wrote to memory of 2384 2616 c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe 29 PID 2616 wrote to memory of 2384 2616 c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe 29 PID 2616 wrote to memory of 2384 2616 c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe 29 PID 2616 wrote to memory of 2384 2616 c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe 29 PID 2616 wrote to memory of 2384 2616 c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe 29 PID 2616 wrote to memory of 2384 2616 c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7db2f2dc554de12f13d17e18475c84d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD532827e69b293b99013bbbe37d029245d
SHA1bc9f80a38f09354d71467a05b0c5a82c3f7dac53
SHA2569250b89157770e3ab59a2c7e2dd6b12b3c61d9b7c6620c3b4727e4bfff10f01f
SHA51258c9a072e2bea0a8f22b4e69512abafad271ca91f2e3d2b4233796dd3d83021aad1c6da69fc8f7e7ca7919d34bde941cb8b5d185b668168866d1180558b93cf5