Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe
-
Size
428KB
-
MD5
e4d6cafa48a29935f3c7b8d642ca65a0
-
SHA1
51d7d38b19259179f39698ebb7a66085fe7656ec
-
SHA256
e67c7a1eefab5298a70d1ab372aa9ffc6ed1dc52e1b2789932de11e723290b13
-
SHA512
315ef9b5fca968a36abc60e672b5c5d853d9bd8f0cf8890b8b54b4e5e74c414e7c37b98a9fc39345396e08d209778e5a9324f293323aaab1b52e7badc9a9ac1d
-
SSDEEP
6144:1AwXaZskSXEBLphN6/2ehqYz/OXnxyNRKIYJxnsAv4r+2wptVfj/REECjfkuzzWH:uwXaZsbEV96BsYz/O3xoh/WjJbCQkWi
Malware Config
Extracted
formbook
4.1
private
jsmsublease.com
texanpreneur.com
playfulsmile.com
zohorstore.com
lakekeoweehousekeeping.com
retail-tool.com
huangxiaojiyj.com
unsoldcarsfastrate.info
lizwoodtravel.com
wacomessenger.com
helps-support.net
magicaltest.com
thedakotafactor.com
citestbiz1597659448.com
lyt520520.com
dowcosta4truckee.com
wildfirepleat.com
alienzouks.com
miodowyogrod.com
sprostudio.com
urbangourmetshop.com
sm-gateway.com
reel258.com
theindianstech.com
solitairegamesfree.com
prismeros.com
justgainz.online
tombison.com
amulyaa.com
joshuaduncandev.com
dr129.com
zhumagali.com
mintconsulting.services
fashionproclub.com
korea-gambler.com
saveonlandscaping.com
sarojagrawal.com
alquilerycomprapanama.com
mollywoodnewslive.com
subsea.supplies
shamansmoke.com
inteleworking.com
narled.com
ocheaptvmall.com
smart-number.net
bodyyoucoaching.com
overnightmillionairesclub.com
vistakraft.com
barefootcrypto.com
aztintbros.com
thehomeberry.com
zgsxpj.com
thisismessiah.com
kaungsettyeeclinic.com
learnapc.com
losiabaar.com
northeastonmusic.com
waltongroup30a.com
jadefiber.com
cobacobaa.com
womrealestate.com
toxye.com
acuative.xyz
fennygrosir.com
ndtlm.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2312-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 552 set thread context of 2312 552 e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 552 e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe 2312 e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe 2312 e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 552 e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 552 wrote to memory of 2312 552 e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe 91 PID 552 wrote to memory of 2312 552 e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe 91 PID 552 wrote to memory of 2312 552 e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe 91 PID 552 wrote to memory of 2312 552 e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe 91 PID 552 wrote to memory of 2312 552 e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe 91 PID 552 wrote to memory of 2312 552 e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4d6cafa48a29935f3c7b8d642ca65a0_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-