Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe
-
Size
847KB
-
MD5
c68506d23178bedf545bb2b028d8572e
-
SHA1
3b4d7f2827f3c11ad73596943a19707d61e92bf5
-
SHA256
17de42648d49e21ed411c460fa0c805443e1898e21114beb8ea7301da3ee6b31
-
SHA512
bf24fcfc36f96eeedeab6cfc222fcc34d8925e29fbdef5fc57ae002237d4202897e2b062ea0fe9552a5514802bb4289ed8a4c6522234d1504cc953acca7f39f2
-
SSDEEP
12288:8ayc8dtxZjKBVbBstxucrzyUYG2gmmz/PXtgobWmpfb4dstkoHQH8mlLeOIP:qPtxFKXboucS5vcz/2Cpvko2pxRc
Malware Config
Extracted
formbook
4.1
3nk4
teresaanaya.com
byronhobbs.com
altiizgara.com
reignsponsibly.com
kanistones.com
clickpk.site
aizzainvestments.com
bpqbq.com
openfitxbstretch.com
blackvoicesstore.com
yousefzaid.com
verdeaccounting.com
independentthoughtshow.com
fainlywatchdog.com
elreventondelsabor.com
spiceyourfood.com
1277hb.com
cesttoni.com
portalngs.com
turismoplayas.com
futurevisiondubai.com
grandpaeddiesbbq.com
tenkillersolutions.com
laagerlitigation.club
kyleandabbey.com
badassbae-bae.com
qraieahckby.com
moskvaoptom.net
autoserviceprovider.com
foodrhyme.com
andrew-vencetore.com
clasimovie.com
universitylook.com
123ufabet.club
bucearte.com
mytreasurecare.com
tenstarcleaning.com
iluvpictures.com
emvision.online
thepurplestrip.com
msrawyh.com
viiokey.com
davidgrayceramic.art
letsdiscover.coach
codingintamil.com
luxtourbus.com
appsofbuffalo.com
lunacardenas.com
aurifexinsurance.com
turkishhouse.restaurant
pureanddutch.com
thechurchboyapparel.com
eyebeamblue.com
upperbunk.com
jsruiyang.com
hillarykelly.com
stanleys.website
2r738euwdfhijn.com
luma-luxury-matchmaker.com
familycarehd.com
securitybyicon.com
myveeta-talents.com
nubianartstudio.com
liancaiwangv2.com
trulex.xyz
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3888-4-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3108 set thread context of 3888 3108 c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3108 c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe 3108 c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe 3888 c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe 3888 c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3108 c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3108 wrote to memory of 3888 3108 c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe 85 PID 3108 wrote to memory of 3888 3108 c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe 85 PID 3108 wrote to memory of 3888 3108 c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-