Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe
-
Size
835KB
-
MD5
d4e0768ec86d2f8d8b6a6b725bda4b87
-
SHA1
4bd5d2c5c06e38cd70a18e4a99c16e0f1f841dee
-
SHA256
09c8bb08807219149a78bfa1e239f5022e6eb2e802f87dffe87d0bcf16e483a8
-
SHA512
f135e550defa90c4fc7d750628aae850405107998f6af9ebcb89b42ba26d3c977f37caff7c694db5617ada189872332dcc5175dd10d1c08e64cad7e3146a0f9e
-
SSDEEP
24576:7iszFFV90kSaUdGAMVb32G6TVjuDsJ8BDeL+cLaA43DBDErHueXsS:1T
Malware Config
Extracted
formbook
3.9
ph
spiderwebz.com
princeworld2.com
elbirligiguclukadin.com
cy1032.com
tourpetour.com
oneintegraventures.com
fmhihlb.com
cslounge.net
prnqf.info
mensa-edu.com
wfc288.com
built-design.co.uk
apnei.com
divachain.com
yuntopon.com
tobaccovision.win
ecogef80.com
onot.ltd
rushhut.com
g6006.com
hashinokuchi.com
bitbloc.tech
safenhizarmz.com
fivestarstamp.net
ljjclean.com
gubqueytsanfold.win
globalminingstandard.com
classenbeauty.com
wildspacemusic.com
nanxiyuan.com
pierdutefrumusetea.info
bebesn.com
webservice-mailing.business
ccdefinite.com
xn--939at7hrojstfozbb1m.com
drink300.com
phobiasgone.online
crystalsapp.com
bellellimexico.com
anunciosclasificados.biz
goexperienceplaces.com
ccgan84.com
eosimplementer-asheville.com
applex.ink
createtshirtdesign.com
erogenouszoneswizard.com
fimidoma43.party
we-ask.info
tagkartel.com
instamanga.style
jiuxingshichang.com
ivtixex.info
18718707187.com
guangmingbaowen.com
coivoiturage.com
shckets.com
2406fifthlineroad.com
cryptowomenjobs.com
qate.ltd
mahery.info
cellmaxx.zone
ruisenmy.com
iqraread.com
zoranus.com
kervax.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2140-63-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2140-67-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2140-71-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2292 set thread context of 2140 2292 d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe 28 PID 2140 set thread context of 1216 2140 cvtres.exe 21 PID 2140 set thread context of 1216 2140 cvtres.exe 21 PID 2652 set thread context of 1216 2652 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2292 d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe 2292 d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe 2140 cvtres.exe 2140 cvtres.exe 2140 cvtres.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe 2652 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2140 cvtres.exe 2140 cvtres.exe 2140 cvtres.exe 2140 cvtres.exe 2652 wscript.exe 2652 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2292 d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe Token: SeDebugPrivilege 2140 cvtres.exe Token: SeDebugPrivilege 2652 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2140 2292 d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2140 2292 d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2140 2292 d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2140 2292 d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2140 2292 d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2140 2292 d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2140 2292 d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe 28 PID 2140 wrote to memory of 2652 2140 cvtres.exe 29 PID 2140 wrote to memory of 2652 2140 cvtres.exe 29 PID 2140 wrote to memory of 2652 2140 cvtres.exe 29 PID 2140 wrote to memory of 2652 2140 cvtres.exe 29 PID 2652 wrote to memory of 1880 2652 wscript.exe 30 PID 2652 wrote to memory of 1880 2652 wscript.exe 30 PID 2652 wrote to memory of 1880 2652 wscript.exe 30 PID 2652 wrote to memory of 1880 2652 wscript.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1880
-
-
-
-