Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe
-
Size
736KB
-
MD5
ca3bf59d8a50c50129515551c389f6d8
-
SHA1
a0db5fb809772e7886672568db1329d75c857b23
-
SHA256
318d039e63460267fa92391159395a8d82f58e98c4c88831eb20780e485d81b3
-
SHA512
87e26b31b904d7a1ac418ab945fb8311ebbc8f9183b885deb2b253b3db1b49b7db6f4f542c50b9b3ee54dcdc5834a42c7e6623e0d56a43bf5ae37cfa3b605776
-
SSDEEP
12288:9watuz+EFVnfzjreMmJzkg0nYvJS15NLgw1g+esTCmu:9watipF7mJIg0A01HLJP2m
Malware Config
Extracted
formbook
3.8
l5
riverchaseapts.net
0430pe.com
nbgift.net
ehkhwn.win
immatthall.com
fkslc.info
breakthroughmediadon.com
eatorganic.life
okcitytowing.com
egaodomain.com
krenbc.com
lavi.ltd
sport-score.com
romskicentar.com
junkyard.design
xn--55q83b758aihq.com
phonerepairlocal.com
5656868.com
1s7onework.men
elizabethreidinteriordesign.com
wajarajalah.com
jaimelesasiatiques.com
physicaltradingprep.com
hyishen.com
parklbridge.com
mayasnature.com
725emeraldbay.com
xnhbyh.net
yayasan-bahrululum.com
gladiatorsofwellness.com
iotsmartlighting.com
0509k.com
alejandrogaxiolacoppel.com
karoai.com
domainengel.com
retraitepep.com
revolutionapex.com
ppr.ink
office-futamoto.com
coinfor.life
my-synfigo.com
spotstore.review
findsyouwell.com
preimersports.com
beunremarkable.com
landes-ocean-vielle.com
toyopika.com
worldmtv.com
chinaqdl.com
phunquesdesk.com
clubsena.info
lubb82821.com
sandyofipswich.com
schoolyardsigns.com
jerritbates.com
coalboilertypes.com
findyourfinancialfreedom.net
wakacjeludu.info
modifiedhealth.com
rootsmarketing.co.uk
swiftstreamerz.com
janym.info
aowing.com
turbo-marketing.co.uk
91ruitue.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2936-29-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 2936 2692 ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2936 ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2936 2692 ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2936 2692 ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2936 2692 ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2936 2692 ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2936 2692 ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2936 2692 ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2936 2692 ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ca3bf59d8a50c50129515551c389f6d8_JaffaCakes118.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-