Analysis
-
max time kernel
90s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
dabd977757d5a8f9f6c4d0eec59aa8b4
-
SHA1
871b0d771cae8940cf701393b73c09af95d28dc1
-
SHA256
1bfc762ad3b4af3779cdc51c124f8e027e9cb5ea7e2a91d2a0fe65feeb6d009b
-
SHA512
fbec5b7307947f8787110f938c021d7b01403089ce772c36b206fe358a469070986680ea6f9880a188c98561bbf41dd4d2678570a16d4749962dd2445487fc13
-
SSDEEP
24576:Xu6J33O0c+JY5UZ+XC0kGso6FaonTouYYB8JTN7PnTNVZ/Vdsq+RLfGMOwtWY:xu0c++OCvkGs9FadNVZIRLfelY
Malware Config
Extracted
formbook
3.9
m2
huiminglu.com
cysine.net
kaleideski.com
southwestdatingtour.com
boniyou.com
etherealvidas.com
blockbookblock.net
edgeerp.net
fixcellnow.com
wrow.ltd
dryceclothing.com
3866636.com
quotesvault.com
eaglesummitfootankle.info
bakehr.net
xpandarts.com
adflybot.info
tarcofinance.net
physicoal.com
109ch.com
kidssaferouter.net
solibud.com
rebutableboss.com
nydy0.info
bibbobuildersllc.net
healedsoul.com
nc1lhk.biz
teduoduo666.com
43-mediatech.com
coincryptor.com
mattgudinski.com
ddgan85.com
crookedfringersartga.com
natashapicciani.com
magpiemirrors.com
taiisun.com
aleynatilkifans.club
tjmeidu.com
remiseria.com
sz6k.com
5758002.com
tutopi.com
bosongjixie.com
toahi.com
zsxrdz.com
ybjsxb.com
healthestfoods.com
elitemodellookaustria.com
rbrbrasil.com
newartordr.com
0805q.com
xn--vng-c7a8e.com
allidawantisyou.com
28zx.com
anioker.world
eletronlexi.com
zbrpf.info
uglypigbbq.com
5i7qo1.com
waroc.design
formative.supply
mybobe.com
deliciouskreations.com
locally-go.com
curitys.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1316-1-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3956 set thread context of 1316 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1316 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 1316 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3956 wrote to memory of 4880 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 86 PID 3956 wrote to memory of 4880 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 86 PID 3956 wrote to memory of 4880 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 86 PID 3956 wrote to memory of 2432 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 87 PID 3956 wrote to memory of 2432 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 87 PID 3956 wrote to memory of 2432 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 87 PID 3956 wrote to memory of 1464 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 88 PID 3956 wrote to memory of 1464 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 88 PID 3956 wrote to memory of 1464 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 88 PID 3956 wrote to memory of 4684 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 89 PID 3956 wrote to memory of 4684 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 89 PID 3956 wrote to memory of 4684 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 89 PID 3956 wrote to memory of 1316 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 90 PID 3956 wrote to memory of 1316 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 90 PID 3956 wrote to memory of 1316 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 90 PID 3956 wrote to memory of 1316 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 90 PID 3956 wrote to memory of 1316 3956 dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"2⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"2⤵PID:2432
-
-
C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"2⤵PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"2⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1316
-