Analysis
-
max time kernel
129s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 23:29
Static task
static1
Behavioral task
behavioral1
Sample
cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe
-
Size
441KB
-
MD5
cbdd7feec1325ccdeedfc3f5ee9f7252
-
SHA1
cb39d5450c2ebe95569dd70b5149e91a32035675
-
SHA256
30a23a5cba3f21206da36e9aa74d872235fc7a25a3751b2bc977803ea4cefa2b
-
SHA512
ef494e9f613c01f6e4229f4be599e3d32325925e0b3f7b4e1016023c883e4ab89cbba9ee5f6161c64658f835a95fd3599cc66cc096286fea4ae0811d5315d0f6
-
SSDEEP
6144:wlGN+601s33fLUifia16Ybj0maWSkweMPX4SF3BIe2TCdR/4/nWSIvF68:FYmfIiMYbj0hPX4M2e2TGcn5Ivk8
Malware Config
Extracted
formbook
3.9
endless
brushedbyjoe.com
arcleyaler.info
51fortel.com
sideqik.biz
goodremedieshome.com
mode3london.com
acroofco.com
clxwou.online
edelweissbrokings.com
carolina-fever.com
k-hager.com
my-first-dildo.com
zuanpinart.com
estudiofuego.com
salihoglugidafmr.com
onlineforbooks.com
taitianrui.com
xn--zf0b677a8sflpn.com
franklindui.lawyer
wearefitlab23.com
wwwxw293.com
mcmahoninsurance.net
html5alive.net
www503222.com
ktstestcounseling.com
kelsouk.com
myweightlosstips.info
hexyjcs.com
nomadicintuition.com
busdrivingiscool.com
hcjc998.com
justgenremovie.info
preparedtrafficupdating.online
leadingarc.com
lihuaxie.com
toriarainey.com
xn--l6q14kkwejr9d.com
sellbuyoldthings.com
markhamgolf.net
mylittlerangebook.net
enyitiancheng.com
wendylynnbird.com
gotcarpetsatlanta.net
hillsdaleestates.info
xmsmdxz.com
51sgbbx.com
anubisdata.com
collectiblejoes.com
pekajekatef.com
kiralikmanliftizmir.info
colorcid.com
yunyunego.com
yky1.com
rongzhentech.com
kinmenkaoliang.com
blakekraftfilms.com
allphazebuilt.com
preparedtraffic2update.review
sofrtp.info
castlewholesalers.net
bt4x4.com
tninf.info
macarthur.tech
tourisme7.com
ts4gaming.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/5084-5-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1396 set thread context of 5084 1396 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1396 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe 1396 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe 5084 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe 5084 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1396 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1396 wrote to memory of 5084 1396 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe 103 PID 1396 wrote to memory of 5084 1396 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe 103 PID 1396 wrote to memory of 5084 1396 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe 103 PID 1396 wrote to memory of 5084 1396 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe 103 PID 1396 wrote to memory of 5084 1396 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe 103 PID 1396 wrote to memory of 5084 1396 cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cbdd7feec1325ccdeedfc3f5ee9f7252_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084
-