Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe
-
Size
873KB
-
MD5
d302a55d33c34c382c7518fdefd49efa
-
SHA1
0601338d74705de83a331a7a60b7e175bc931329
-
SHA256
34eeebc4197df0980b621253c336662f3868ccc65a5f99a832d47751d4d5384e
-
SHA512
03d34237a54e0f32b400a49ba497de75dcf9b0c434c0826a8efa40bb4993c33431c8be7a555cf5f16f5ead02ab62fc0805144ba550da916624ca697819012a26
-
SSDEEP
12288:8Db7BqrErn/mxx7E6vMJaxKwWoFJm6y2o/Yc4/P2x1AFWqjwomGgosFI0+jN7RS8:8FBrny7d7eqq2Z32osomGuFI0+jN7
Malware Config
Extracted
formbook
4.1
3nk4
teresaanaya.com
byronhobbs.com
altiizgara.com
reignsponsibly.com
kanistones.com
clickpk.site
aizzainvestments.com
bpqbq.com
openfitxbstretch.com
blackvoicesstore.com
yousefzaid.com
verdeaccounting.com
independentthoughtshow.com
fainlywatchdog.com
elreventondelsabor.com
spiceyourfood.com
1277hb.com
cesttoni.com
portalngs.com
turismoplayas.com
futurevisiondubai.com
grandpaeddiesbbq.com
tenkillersolutions.com
laagerlitigation.club
kyleandabbey.com
badassbae-bae.com
qraieahckby.com
moskvaoptom.net
autoserviceprovider.com
foodrhyme.com
andrew-vencetore.com
clasimovie.com
universitylook.com
123ufabet.club
bucearte.com
mytreasurecare.com
tenstarcleaning.com
iluvpictures.com
emvision.online
thepurplestrip.com
msrawyh.com
viiokey.com
davidgrayceramic.art
letsdiscover.coach
codingintamil.com
luxtourbus.com
appsofbuffalo.com
lunacardenas.com
aurifexinsurance.com
turkishhouse.restaurant
pureanddutch.com
thechurchboyapparel.com
eyebeamblue.com
upperbunk.com
jsruiyang.com
hillarykelly.com
stanleys.website
2r738euwdfhijn.com
luma-luxury-matchmaker.com
familycarehd.com
securitybyicon.com
myveeta-talents.com
nubianartstudio.com
liancaiwangv2.com
trulex.xyz
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4508-4-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3360 set thread context of 4508 3360 d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3360 d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe 3360 d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe 4508 d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe 4508 d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3360 d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3360 wrote to memory of 4508 3360 d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe 84 PID 3360 wrote to memory of 4508 3360 d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe 84 PID 3360 wrote to memory of 4508 3360 d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-