Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe
-
Size
475KB
-
MD5
e79bd8b4aa11afd86c932fa441d6544e
-
SHA1
eea8d0048c7b4ae55127665b5e6991a112dd0c32
-
SHA256
d1a6eb1637a42a3098f5b0ecbfdcb7011422cdc110a9d481043ddc964cc49cb1
-
SHA512
17b93470ab610ffe5b968d86e1f9a46efa50142005e60bda8de85d1a4f56df09ad828337b7bf84f9fd0aaa40b4bc4157877ecb7a0c365e1f86dbb0387a3fa705
-
SSDEEP
12288:a5qGhlH60YUkNEB3ZjkeZvz4MhXUyHKjedkt+cTpPRuusB:aD6QP/K2VB
Malware Config
Extracted
formbook
4.1
gtl
45687g.net
graveimport.com
bulldogsgear.com
service-support.email
uhzcflg.icu
zebradefensefund.com
make10xhappen.com
ecotegral.online
stillatwink.site
onwardatlanta.com
real-optionstheory.com
madbearcustomwoodworking.com
adelinekaczmarek.com
elia-lca.com
tinykreations.com
rawlinsrealty.info
ubcholdings.com
searko.com
lepinedoree.com
fundsrecoveryexperts.com
hdbymaggie.com
melhoresradios.com
natachez.com
nosquitos.com
skfashion-bd.com
healthyhabitsdiary.com
figcondos.com
torontobet109.xyz
k5759.com
everythingnitro.com
yolocraft.online
girlsweet88.online
beiser-sa.com
blackcardofsuccess.com
aprodigaldaughter.com
nxjiuding.com
objetboiscreative.com
angelinafurusho.com
uavphotoworld.com
melbet-official-bk-info.com
besthalalguide.com
samsungbtb.com
illawarrablinds.com
ratgeber-aktuell.info
tiktokmerch.club
zx565.com
sit-techno.com
leveragewholesaler.com
mymailtek.com
xb-xsy.com
caileygrunhard.com
pibyx.com
rnshaircare.com
todopilates.com
aureusgoldcorp.com
lblcclkchain.com
starlyconsulting.com
ndjamua.com
ahoradanoticia.net
mtcrosbyphotography.com
cutecvv.business
dach-realestate.com
assetmanagmentservices.com
sainu.website
9dgevjb.net
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1944-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1944-14-0x00000000008D0000-0x0000000000BD3000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3012 set thread context of 1944 3012 e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1944 e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3012 e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1944 3012 e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe 31 PID 3012 wrote to memory of 1944 3012 e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe 31 PID 3012 wrote to memory of 1944 3012 e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe 31 PID 3012 wrote to memory of 1944 3012 e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe 31 PID 3012 wrote to memory of 1944 3012 e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe 31 PID 3012 wrote to memory of 1944 3012 e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe 31 PID 3012 wrote to memory of 1944 3012 e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\e79bd8b4aa11afd86c932fa441d6544e_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-