Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe
-
Size
365KB
-
MD5
e300b0ea04a1c33f7b0ca2a924632d3c
-
SHA1
47ec6138765a54036ce46ddb900d4ceccfe6d698
-
SHA256
ec42d1761aba72e3789f1d11e744c46394c2929dfef85c8d6297d37a89057b83
-
SHA512
f746ea33cb60e2e811a8ecfcd62e3ca0f3073e67c895bb81c0a18eb3b30b19f73da6bd4dee9c303034763001e8b1645b7e12959950cacff3279a706614b72eac
-
SSDEEP
6144:hBplqXThHWJohGUzxQPlmzGhfeF/ohaNuuH1ay951GfWkP3yd+1rH8zGlzWdlJvE:FlNJoMUmPlmzGhm50oFTUWkv/HQX6
Malware Config
Extracted
formbook
3.9
s8y
jazminewphoto.com
luyansu.com
mastertouchusa.net
hengyuangcjx.com
happinessabscissa.online
kinderspielproject.com
namoloja.com
wattwatchers.energy
ambikaprabhu.online
280top.info
emailtoast.com
holoidayinn.com
usthadhotel.com
jilinhengjinyaoye.com
walden.land
huicbxw.com
zhiyidetrade.com
ykm365.com
whmc99.com
jamiecarbetta.com
intesacasa.com
nolieo.net
xqxds.com
africaheli.com
bdplaza.com
bishopadv.com
athinasailing.com
timpview.news
focus-ecommerce.com
kaffeemall.com
kingsofbaxter.com
assignmentasiantyper.com
wtt36.com
prhekv.men
brokenbirdcage.com
xn--vcsy46a6r3a1th.biz
js-no-tec.com
hotelsoverbooking.com
kanglaotou.com
jylavoie.com
onlinebhikhari.com
thuyhoangcoto.com
badonmar.com
popshotsphotography.com
perlengkapanelektronik.com
tcpsiz.men
michaelsdbablog.com
cheap-clothes-for-women.site
ahmadnasradin.mom
137137137.com
lyet.ltd
makemycircle.com
xovert.download
brooklynporsche.net
banksecorner.com
sake-shirts.com
softprint.biz
kopa.ltd
anastasiasfantasy.com
giftcardsforall.win
viwdfw.info
realityrevealed.info
markmackoart.com
minorperks.com
nyoxibwer.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2864-11-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2864-15-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\SpZAv = "C:\\Users\\Admin\\AppData\\Local\\SpZAvd\\SpZAvdNxd.hta" e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1732 set thread context of 2864 1732 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 31 PID 2864 set thread context of 1204 2864 InstallUtil.exe 21 PID 2312 set thread context of 1204 2312 cmd.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2864 InstallUtil.exe 2864 InstallUtil.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe 2312 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1732 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 2864 InstallUtil.exe 2864 InstallUtil.exe 2864 InstallUtil.exe 2312 cmd.exe 2312 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2864 InstallUtil.exe Token: SeDebugPrivilege 2312 cmd.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2864 1732 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 31 PID 1732 wrote to memory of 2864 1732 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 31 PID 1732 wrote to memory of 2864 1732 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 31 PID 1732 wrote to memory of 2864 1732 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 31 PID 1732 wrote to memory of 2864 1732 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 31 PID 1732 wrote to memory of 2864 1732 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 31 PID 1732 wrote to memory of 2864 1732 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 31 PID 1732 wrote to memory of 2864 1732 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 31 PID 1204 wrote to memory of 2312 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2312 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2312 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2312 1204 Explorer.EXE 32 PID 2312 wrote to memory of 2952 2312 cmd.exe 33 PID 2312 wrote to memory of 2952 2312 cmd.exe 33 PID 2312 wrote to memory of 2952 2312 cmd.exe 33 PID 2312 wrote to memory of 2952 2312 cmd.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-