Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
dd3f06103f2ac425cf4e5a6dc65d31d6
-
SHA1
972a1b325cc3abc48a94c90a7b51faea619cfcc9
-
SHA256
262d8dd389aad1ef11023ded97da5703e88f1a96c2b0b8a1dbdde5fa7ee04022
-
SHA512
8863a2c6f690d215ddf54476832f0e1a7f539bf0b07013aad2e6b86054f0cd5f6cbc11efd2ef5c9b799a7dce2138d6daa5093f2eae6e15fde563951800836751
-
SSDEEP
24576:Du1NZfx3LwkwC2uEYY1pSIEiPNMDXiPCxN4ar3DV8bxOpwK:qVfx3LMzYY1EIEiPqzkGz/
Malware Config
Extracted
formbook
4.1
cmg
8936199.com
caneryis.com
kkambo.net
lifecoachwoman.com
kardus6.xyz
larvashop.net
stapelskerstbomen.com
dropofluxe.com
1089konstanzter.com
simplelovedlife.com
manderley-condos.com
xexpressx.com
cheshuntcomp.com
chinazhenzhu.com
autoaccessoriesusainc.com
luccagamesawards.com
edwardguimont.com
aljawaheer.com
rootforequality.com
premiumtechiessupport.xyz
ix1e.com
ravomail.com
fastroot.club
fortnitecup.space
47.holdings
northminute.com
cenitcard.com
yumnamccann.com
irelandjoy.com
ohayouapp.com
iaimorganic.com
essecehealthcareotc.com
esanjor.online
shabdhan.com
ipatch.pro
makeassociation.com
promstudios.com
vocenaviagem.com
quanahsays.com
trousersport.guru
stickerzy.club
get4gbroadband.com
txtecnic.com
pricescuisinecrinak.com
clicdrone.com
oxbstwnm.icu
helloboysonline.com
amibagusa.com
igrowtr.com
microbladingpamplona.com
usabakk.com
talent-partner.com
messi-and-ronaldo.com
nwslot.com
beaconpointeportage.care
uciabwd.com
playredpandagames.com
clearyt.com
sonakshidhamija.com
mantinakliyat.com
amusic11.com
salonboardshop.com
nughte.club
kayparkermilf.com
shizukis2.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4032-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4972 set thread context of 4032 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 4032 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 4032 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4972 wrote to memory of 2164 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 95 PID 4972 wrote to memory of 2164 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 95 PID 4972 wrote to memory of 2164 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 95 PID 4972 wrote to memory of 1528 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 96 PID 4972 wrote to memory of 1528 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 96 PID 4972 wrote to memory of 1528 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 96 PID 4972 wrote to memory of 4032 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 97 PID 4972 wrote to memory of 4032 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 97 PID 4972 wrote to memory of 4032 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 97 PID 4972 wrote to memory of 4032 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 97 PID 4972 wrote to memory of 4032 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 97 PID 4972 wrote to memory of 4032 4972 dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe"2⤵PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe"2⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd3f06103f2ac425cf4e5a6dc65d31d6_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-