Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe
-
Size
480KB
-
MD5
e090659ceddf516afe22c05a1d7c421e
-
SHA1
9d689fe9ccf3d1ea8b19fc4330c779b5a2b95a82
-
SHA256
a8ec85bda1213a2c4bace2c6bb0eed7116bbd7fd6111bcb52501844b84c2aeea
-
SHA512
f88b170a97186ef4599f0e2e5e69dd584fd5c4811c02d18726b9309a774687251f669b761e34175383d7dd16a4fd1b540a0113d049135ef42145f651ee9b6636
-
SSDEEP
6144:BGaCrFURkb6dBVHaIh/8SUJX5RVUCZlFGvsnQoG5YaJise4IeEzNlV/IaQ:EKkA9FSUC8OQoRaJisewEzN
Malware Config
Extracted
formbook
3.9
i01
viagensbaratasonline.com
lacuevaelmirlo.net
genevaly.com
analpornolariizle.com
rupee.network
pay69645.com
superhsr.com
foammemorymattress.com
jolded.com
bbb684.com
diabetessimplesweet.com
bybeast.com
keut.world
xxjj10.com
youde-88.com
highkickproductions.com
beijingzhjy.com
partnership-aid.com
sehorecollegesehore.com
wangluopay.com
prfromafar.com
gymingreviews.com
gongjubu.com
pp-kontoservice.net
genesiscrafter.com
zurnpx.men
i-baoshan.com
areyoulivingyourlifepurpose.com
snseos.info
nrglighter.com
powergridenergysolutions.com
wspi-shipping.com
zharemedia.com
theexpandedmind.net
veteransforhouston.info
hbqnkjzxxy.com
ikraenglish.com
activpot.net
mobile-exchangeoffer.download
my-spar.com
grubfanatic.com
5173games.com
myfinancialnavigator.com
sacralworld.com
hocaoglugroupgayrimenkul.com
p3rdu-f70ur.com
fileextensionsys.com
skid.agency
wysholdings.com
genomicplasticity.com
facturebi.com
cubicproltd.com
anak-warteg.com
pssdqk.win
aaa4d.info
evolutaprofessional.com
kirstinpinit.com
cheapbookingrooms.com
caldaietop.com
admin.management
tiptotailgrooming.com
yxyx661.com
kivinstech.online
undermoments.info
virxus.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1324-7-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1324 e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1324 e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe 1324 e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1324 e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe 1324 e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1324 e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1324 e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e090659ceddf516afe22c05a1d7c421e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:1324