Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 22:19
Static task
static1
Behavioral task
behavioral1
Sample
ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
ce0e01fd8d3070f09c33a1346e43a711
-
SHA1
985cbc20e293cd32340929ef2de36e18700a3fcf
-
SHA256
edf20bb235ae7ab72ec821f7aaadeb7303abafbc3dc2c8cb17449744d8680dd2
-
SHA512
54d64f10efe11421cdd37ca488aa02948a9c3c778eb6f848a22dbd79c5021f5960ede259b736873e93661f954b17ee19423ac076495b7b4c66d6ea3de93e2a8f
-
SSDEEP
12288:JSR/nSvlzri7ahRbG4YY7Awj/QiPgzTq+xwY/NYs+NL/5nRg:oR/nA1ricb17PGq+iYSljC
Malware Config
Extracted
formbook
4.1
vrs
redearthmedical.com
miresidencia.pro
zhaoshimei.com
inavawetrust.com
webpushup.com
hybank.technology
ezlynxteam.com
kissvegan.com
johannas-coaching.com
ethicalinvestor.net
rentitslc.com
thehumansofblm.com
trashbagdylan.com
domennyarendi35.net
dooginz.com
cvdnxd.com
petbuddyryde.com
undptenders.xyz
miracleofcreation.com
999sq.asia
adorabledemons.com
carbeloy.com
southtxjobs.com
xlangzhong.com
kingdakarai.com
loveforlifenursingagency.com
lagoseyecenter.com
forme-yoga.com
swipradio.com
diamondsgoldrefinery.com
duchessofdisco.com
vfpf1.com
ah-ps.com
goldmarkcityhotungmau.net
1240firstavenue.com
good-vehicle-939902.xyz
artisticiabels.com
writeinsusanhutchison.com
fancytextwala.xyz
rspace2019.com
ujwkaisola.com
geraloqaresuine.com
opticlaboratory.com
rpplasticos.com
topstylechaussure.com
freestateiowa.com
ipotecario.com
xn--80aaeybmmj5b.xn--p1acf
expertscoffee.com
keepersbookkeeping.com
uts-coal.com
ckersvlsn.icu
householderesponsr.com
pleromastudio.com
oghomeinfoa4.club
mindsetofaneagle.com
sdbme.com
tamalesmatter.com
smeelah.com
labrya.com
integrativeimmunitydoc.com
arepsgdl.com
kjhqnnltj.icu
ryan-spencer.com
nicenessential.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1216-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 1216 1700 ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1216 ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe 1216 ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1216 1700 ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe 97 PID 1700 wrote to memory of 1216 1700 ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe 97 PID 1700 wrote to memory of 1216 1700 ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe 97 PID 1700 wrote to memory of 1216 1700 ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe 97 PID 1700 wrote to memory of 1216 1700 ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe 97 PID 1700 wrote to memory of 1216 1700 ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce0e01fd8d3070f09c33a1346e43a711_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-