Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe
-
Size
365KB
-
MD5
d5f142b409d4ee2db56859ac3ecdad66
-
SHA1
3048d6d0fae713f04145e190c2e24047efaaef7e
-
SHA256
4883acd78928ccbab14d46de6f5be7ed91f0d6be16ad83b5214dfbbb218865bf
-
SHA512
dac8b3c4a3d19753ef1cff5c17e4c1470897175cac0854c922c406acbb589192ab9614d0e965344789b1644ec62971e0664fc7466926d5788750063f242a4e6b
-
SSDEEP
6144:Q9x8PY/bqy9n2wRfvtkOthbRiPwEMJ4ynpMiO6h1Kkbb9pIPKaaMqXFU2XihU:Q9x8PuhRFRdDhtuW4ybL1xbRKPtHT
Malware Config
Extracted
formbook
3.9
l9
vegobro.com
smartcoffeetoday.com
30ans2chats.com
montidauniospitali.com
quarterlifestyleblog.com
euronlinesolutions.com
compositedoors2you.com
swiftdws.com
fivestarenergyspecialist.com
wwwyh6622.com
outdoor-grill.site
fireequipmentatlanta.com
8640pe.com
kzwzx.loan
thincore.net
smsdshop.com
qzchangxinsb.com
jswztc.net
qjqlfhu.com
noza-consulting.com
klcp5588.com
swisslipstick.com
creano.agency
tiocstore.com
jubaleditore.net
baskent-ailesi.com
ryancrafty.com
007manbetx.com
9419heinerstreet.com
themuslimwealthportal.com
bm870.com
qidianssl.com
greatonlinecasinoguides.site
artisleafandbean.com
bitagnose.com
znjfu.net
kabarindo.online
rosebudbandb.com
university4health.com
arccedar.com
houston.construction
wakaresase-reach.com
educhktertiarystugroup.com
ohana-support.com
kiurig.com
bluechipprepurchase.com
teachersdropbox.com
china-compressedair.com
serviceuplogin.com
1m9zeroautumn.men
amazon-tuiguang.com
saasjl.com
totemequity.com
gesoip.info
newexpertise.biz
teresa.life
furnituware.com
storyboardsonline.net
treaonline.com
365gundehaber.com
activefreight.network
xn--rtzo0z8qr.com
childrensee.com
lifeinanemptynest.com
alyenx.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3400-5-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2816 set thread context of 3400 2816 d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3400 d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe 3400 d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3400 2816 d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe 95 PID 2816 wrote to memory of 3400 2816 d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe 95 PID 2816 wrote to memory of 3400 2816 d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe 95 PID 2816 wrote to memory of 3400 2816 d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe 95 PID 2816 wrote to memory of 3400 2816 d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe 95 PID 2816 wrote to memory of 3400 2816 d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-