Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe
-
Size
268KB
-
MD5
e5fb31f7be04068fc088418d642e292b
-
SHA1
9c043826be0f12c96dce9a58b6793dfe33926589
-
SHA256
42154d0805933548da9b7a9fbbce40be9e155091e6f96ed4ce324c21b3430b20
-
SHA512
717dd2e37ca44041293dfda5bd6a455c83d33d62e55a0d34bfdbe90deddf12e65dafff3819de3a38e59d241cd2aca2f7ecbfe366935b6fff0a21846176ae9299
-
SSDEEP
6144:AyaOH6GdiNywts0oFiv4HmdChI7Cm6Vad:+f3i44GdyIH
Malware Config
Extracted
formbook
3.7
ch27
lijianfans.net
keziamandelin.com
goldenoceanoutdoor.com
isilvaphotography.com
cindypantoja.com
animalfriendsllc.com
diikey.com
trainerpoqe.men
berastours.com
pagelink.info
lemsinternetbiz.site
cervezascolder.com
bombom.site
heromorfin.com
eltirachinasasturiano.com
spacity.biz
microbladingshop.net
tfworkstation.com
mengxiaoxi.net
ggg585.com
thrivemediadesigns.com
yzlaw120.com
grademg.com
chundanfood.com
taibeiai.com
quistock.com
wxm119.com
manbet507.com
553413.top
crete-exhibitions.com
meinvmote.com
ddluav95.com
86photos.com
reslimited.net
intrumpwetrust.loan
kbmuonline.com
lampung.email
samdismore.co.uk
ngc.gold
onlydebauchery.com
getonlinefree.com
wilsonsprom.cruises
beoyafushi.com
exxonmobileofp.com
meiluhome.com
pprproducts.com
xn--q3cjk0g0c2ad.net
megalegenda.com
umnyash.com
oobin.info
idaho25.com
vmetric.com
arbetekraft.com
annaossanna.com
xn--74q37fh5e728f.com
fihdal.men
madzanimations.com
strongbelly.com
ylpzt.loan
ap17-09-07.com
nogikeya.net
spaceoperakaraoke.com
ymaiul.com
271simsroad.com
wayyout.info
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2344-3-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4488 set thread context of 2344 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2344 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe 2344 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4488 wrote to memory of 2344 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe 87 PID 4488 wrote to memory of 2344 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe 87 PID 4488 wrote to memory of 2344 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe 87 PID 4488 wrote to memory of 2344 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe 87 PID 4488 wrote to memory of 2344 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe 87 PID 4488 wrote to memory of 2344 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe 87 PID 4488 wrote to memory of 2344 4488 e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-