Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe
-
Size
444KB
-
MD5
cb18c25c997f934bf0ef7b0e869c79ae
-
SHA1
1700768b5b0d8670700aeb08feb91f6272310a1a
-
SHA256
82c7e2de66d1f85945118b2c1056c53d893a1b7017077cb28d53759732aaad98
-
SHA512
62a445dac0c5ff42fcb264de2159bc674f4c03c3b00c4c8ea233065722c3df04477d10d42c1b7278cc4422930f3301123792596605f7155145f058ba329b1ded
-
SSDEEP
6144:t3YZlH4Y/htMCmaHKAVrs4ZoRsKhMOr2tcyiY+VfUYsuPk:t9CTeKtGsIYaUYsuPk
Malware Config
Extracted
formbook
3.9
pe
maytoken.com
esportsacademyhk.com
evanjjackson.com
creeksideatbethpage.life
thebigpigfarm.com
taiwanais.com
g-lectro.com
isabellafraiss.com
warriorfarm.com
todomascotasmerida.com
jonsnow.men
foodtreebd.com
thenorthernlightsmusic.com
weiai888.com
sklepfuji.com
coffindepot.com
swingerssociety.com
wuzixubingfa.com
iaruid.com
zgsdcf66.com
no-stringscountry.com
gongxiangzhanghaowang.com
medi-strains.net
herbmachine.com
lifemasterclass.info
hailougou.com
adrianwarrellthehistoryman.com
lilyandbrian2018.com
cruisinclassicautosales.com
00agag.com
deepmindiot.com
imtmachine.com
cuentavoto.com
my-investment-property.com
chinahuazhuo.com
napalandman.net
equifaxsecuritq2017.com
alexandre-allard.com
dtrwy.info
teamevanssd.com
abetterupdates.win
saludmia.com
maccheronicini.com
mehtassociates.com
containerlots.com
phonecreators.com
bibetts.store
godspee.com
spark-solutionsinc.com
carolachaparro.com
77arar.com
srvloprestihomes.com
crossconnect.online
tattoodedication.com
pitterpatterson.online
914eq4.faith
highlightscomunicacion.com
pikarahoitus.net
gteducorp.com
daltonic.com
xn--cpqr35ehxo.com
xn--6w2bt1chy0a.com
hanlei.site
pureandhalal.com
balonck.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1760-4-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2648 set thread context of 1760 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1760 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe 1760 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2648 wrote to memory of 1760 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe 94 PID 2648 wrote to memory of 1760 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe 94 PID 2648 wrote to memory of 1760 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe 94 PID 2648 wrote to memory of 1760 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe 94 PID 2648 wrote to memory of 1760 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe 94 PID 2648 wrote to memory of 1760 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe 94 PID 2648 wrote to memory of 1760 2648 cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb18c25c997f934bf0ef7b0e869c79ae_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4404,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4048 /prefetch:81⤵PID:4028