Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe
-
Size
724KB
-
MD5
e8cdc455c726afea65ab6a4b0b45d45c
-
SHA1
fdd9d44b3aea76ad42f64cab1f433f8daae99e0e
-
SHA256
f972763991a3043f1e9cca9c8b0d368d6ff9628bbb21fbe4d7213ffd75a67494
-
SHA512
6009df138097dda48489c15647cf834406cd15331720b52ef0787af191b36b95d42ecb06731a29add61a6c78d9bdb376b2b3ba91ba7d91d8741d2abd665b48af
-
SSDEEP
6144:wT0p9994cccccccmMI4LSMd1ZOOP9eT+R8a2sUrJLa5SvSWlTlOiIoJuZ2sWTjuQ:wwuMIyDzEOPUyCsR5SOAJhyJVLPQ
Malware Config
Extracted
formbook
3.9
pe
blackcatproud.com
kddgu.info
jhholiday.com
woshunwang.com
qrvou.info
yinuojie.com
404arabs.com
diaojieorg.com
hsyfjj.com
medusabotanicals.com
ghay5c.com
wm785.com
bikeandart.com
ygyroadside.info
whitewings.biz
4pointpartnersbv.com
tukangsedotwc.net
democrataward.com
systemtraffic2updating.win
thevlu.com
wbwxfw.com
angeladiscountmall.com
sisarservices.com
bajaringantangerang.com
betwin0000.com
spectrumreachdata.com
czzzw.com
aquaristik-ratgeber.com
caroloverland.com
heartygiftz.com
wanli118.com
ellieenichen.com
xn--fiqs8sxwbx9y.com
sergunsolarmarket.com
shuyiren.com
allsystemsupgradesnew.review
radiomenina.com
dbsdgc.link
fudaoshidai.com
bankratestoday.com
birch.media
saddesklunchclub.com
heretale.com
nela-art.com
koolmugz.com
recruitmydigitalpeople.guru
isitstable.com
sthonghu.com
savewithdaverna.com
netmaniacs.net
super-disco.com
desibazao.com
kdframingdrywall.com
rescuingtheperishing.com
silo.fund
mailitunes.com
china6ix.net
zohulu.com
computeremporium-mail.net
vfhzaogjgu.info
yysajp.com
buypropecia-generic.com
cryptbooks.com
gewoongoede-atikels.info
xymakdoc.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4860-6-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3316 set thread context of 4860 3316 e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4860 e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe 4860 e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3316 e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3316 wrote to memory of 4860 3316 e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe 89 PID 3316 wrote to memory of 4860 3316 e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe 89 PID 3316 wrote to memory of 4860 3316 e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe 89 PID 3316 wrote to memory of 4860 3316 e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe 89 PID 3316 wrote to memory of 4860 3316 e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe 89 PID 3316 wrote to memory of 4860 3316 e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe 89 PID 3316 wrote to memory of 4860 3316 e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4288,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:81⤵PID:4680