Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 16:52
Behavioral task
behavioral1
Sample
cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe
-
Size
704KB
-
MD5
cb40c157e93e8013af5447c28fd3b942
-
SHA1
16b0df235b3954c6e6b96f7aecc252f22bc021db
-
SHA256
b8d074da8531b10cee3844431f8502da1a3932586fb6fa82da7a38da44409026
-
SHA512
d4bf092e3c911aeed4f88d2327ee9300fb3cc7501ab85e47596fb620dd40667265ca05b29f2fba3eac6ba15b0c19d66b185ab214eb7ef7a68349bb4d5fa3303d
-
SSDEEP
12288:zIwR9YVsNiXfvHFhixCUlskyCeKfAA1T4uJjx7aEiC0:zIIYVyyvHjisayNZASwVaEt
Malware Config
Extracted
formbook
3.8
l5
riverchaseapts.net
0430pe.com
nbgift.net
ehkhwn.win
immatthall.com
fkslc.info
breakthroughmediadon.com
eatorganic.life
okcitytowing.com
egaodomain.com
krenbc.com
lavi.ltd
sport-score.com
romskicentar.com
junkyard.design
xn--55q83b758aihq.com
phonerepairlocal.com
5656868.com
1s7onework.men
elizabethreidinteriordesign.com
wajarajalah.com
jaimelesasiatiques.com
physicaltradingprep.com
hyishen.com
parklbridge.com
mayasnature.com
725emeraldbay.com
xnhbyh.net
yayasan-bahrululum.com
gladiatorsofwellness.com
iotsmartlighting.com
0509k.com
alejandrogaxiolacoppel.com
karoai.com
domainengel.com
retraitepep.com
revolutionapex.com
ppr.ink
office-futamoto.com
coinfor.life
my-synfigo.com
spotstore.review
findsyouwell.com
preimersports.com
beunremarkable.com
landes-ocean-vielle.com
toyopika.com
worldmtv.com
chinaqdl.com
phunquesdesk.com
clubsena.info
lubb82821.com
sandyofipswich.com
schoolyardsigns.com
jerritbates.com
coalboilertypes.com
findyourfinancialfreedom.net
wakacjeludu.info
modifiedhealth.com
rootsmarketing.co.uk
swiftstreamerz.com
janym.info
aowing.com
turbo-marketing.co.uk
91ruitue.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4052-6-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
resource yara_rule behavioral2/memory/4532-0-0x0000000000400000-0x0000000000586000-memory.dmp upx behavioral2/memory/4532-2-0x0000000000400000-0x0000000000586000-memory.dmp upx behavioral2/memory/4532-9-0x0000000000400000-0x0000000000586000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4532 set thread context of 4052 4532 cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4052 cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe 4052 cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe 4052 cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4052 4532 cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe 103 PID 4532 wrote to memory of 4052 4532 cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe 103 PID 4532 wrote to memory of 4052 4532 cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe 103 PID 4532 wrote to memory of 4052 4532 cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe 103 PID 4532 wrote to memory of 4052 4532 cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe 103 PID 4532 wrote to memory of 4052 4532 cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cb40c157e93e8013af5447c28fd3b942_JaffaCakes118.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3884,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4148 /prefetch:81⤵PID:1056