Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe
-
Size
383KB
-
MD5
e6f07c4af3e5cb4d02d44f0b758604a0
-
SHA1
e03ae248c99b5cb6f0aba67d67f29ecb0eedb107
-
SHA256
241245cb421ccd025316c936471b0f6cf3c4ac4eb00ee45e4a91b7d63b1abf2f
-
SHA512
3a5d1386937f1a25969a172b32cc69d291a472b05da80b761c847997736b8076822cbe460b9546514f41a88eb94280777750c299c9258156b3982b52afb7f368
-
SSDEEP
6144:2DXdayqqqqqqqqqqqqY4Vzb81ILy0pEiT3ijHTj/zZW/vsJap7fTaYsc0mWW0eef:OaieIfpDTSjXyHmbjjVmmR
Malware Config
Extracted
formbook
3.7
jj
raproll.com
kombipack.com
dhl365.com
vhoxda.men
zisigui.com
i-o.ltd
serenitynowcafe.com
huntsafety.com
caquciqu.com
novoflexled.com
54smg.com
bintrade.info
34f7j3k.online
wwwjs80088.com
lifestylestimes.com
gradientdecisions.com
h-v-s.com
eternallybound.win
nafa.ltd
veteransusa.site
aikeshuma.com
coolrick.com
ahsanakhunzada.com
hiromori-jp.com
helixstidios.com
searchingforcitizenship.com
einveru.life
govuday.com
wdkhome.com
gartrells.com
biasharaexpress.com
dbiro.com
essaytica.com
anhcp.loan
xn--urru01kwmc.com
mediahfln.party
izzybernier.com
zionchain.com
evodidsbury.com
trascender.foundation
fishmeatwine.com
8160pe.com
filgnj.info
securiitycompass.com
dullhorizon.com
thisisicontrol.com
segurosemporda.com
8luedoor.net
comerfuengirola.com
spaceshift.design
hkcmcl558.com
community-assist.com
liableeducation.com
smalldigitalagencies.guru
drdmk.info
avantapres.info
adventurecapitalisthacks.tech
aerokel.net
pokernqq.com
nicksaban.football
healthplusmyanmar.com
51gdqwb.com
tryepic360.info
doeapp.com
unlimitedcheckins.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/632-3-0x0000000001E20000-0x0000000001E68000-memory.dmp formbook behavioral1/memory/1468-11-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 632 set thread context of 1468 632 e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2396 1468 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 632 wrote to memory of 1468 632 e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe 30 PID 632 wrote to memory of 1468 632 e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe 30 PID 632 wrote to memory of 1468 632 e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe 30 PID 632 wrote to memory of 1468 632 e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe 30 PID 632 wrote to memory of 1468 632 e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe 30 PID 632 wrote to memory of 1468 632 e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe 30 PID 632 wrote to memory of 1468 632 e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe 30 PID 1468 wrote to memory of 2396 1468 cvtres.exe 31 PID 1468 wrote to memory of 2396 1468 cvtres.exe 31 PID 1468 wrote to memory of 2396 1468 cvtres.exe 31 PID 1468 wrote to memory of 2396 1468 cvtres.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e6f07c4af3e5cb4d02d44f0b758604a0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 363⤵
- Program crash
PID:2396
-
-