Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/jsgdacail.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/jsgdacail.dll
Resource
win10v2004-20240802-en
General
-
Target
ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe
-
Size
257KB
-
MD5
ec50a0d1ba634421cc3301633343ed04
-
SHA1
bbb06fe1fb5e61e37a3e709228064ee318e6c74d
-
SHA256
fa0d4eeae6c743ddc44d9664b0e6d44238beff477d1f4e9a560e68026a4264d9
-
SHA512
39ce4a5d8ae8c33b8fda65443f7decc9661cc4ab4734810530bda3a8ab769223ce56b66eff1f679f4cb7da9fcfe14cfce7d17ae1576c99c4eb51bd20063de023
-
SSDEEP
6144:F8LxBs2+gAyry4UTQ9V+wp8SYNbNlpX40zpMmEg4FwN:/2+HnSV+wWvNbNlpXzJMwN
Malware Config
Extracted
formbook
4.1
rv9n
olivia-grace.show
zhuwww.com
keiretsu.xyz
olidnh.space
searuleansec.com
2fastrepair.com
brooklynmetalroof.com
scodol.com
novaprint.pro
the-loaner.com
nextroundscap.com
zbwlggs.com
internetautodealer.com
xn--tornrealestate-ekb.com
yunjiuhuo.com
skandinaviskakryptobanken.com
coxivarag.rest
ophthalmologylab.com
zzzzgjcdbqnn98.net
doeful.com
beatthebank.fund
deposit-pulsa2021.xyz
uptownsecuritysystems.com
thegroveonglendale.com
destinationth.com
healthcareuninsured.com
longhang.xyz
ypxwwxjqcqhutyp.com
ip-15-235-90.net
rancholachiquita.com
macblog.xyz
skillsbazar.com
beatyup.com
academiapinto.com
myguagua.com
fto8y.com
ohioleads.net
paravocebrasil.com
thecanyonmanor.com
acu-bps.com
comunicaretresessanta.net
schwa-bingcorp.com
discountcouponcodes-jp.space
kufazo.online
metaverge.club
800car.online
brendanbaehr.com
garfieldtoken.net
secretfoldr.com
13itcasino.com
marketingatelier.net
computersslide.com
marcastudios.com
thestreetsoflondon.life
maintaintest.com
cronicasdebia.com
apm-app.com
sepulchral.xyz
lodha-project.com
theartofsoulwork.com
swimminglessonsshop.com
klarnabet.com
control-of-space.net
heliumathletic.com
cjspizza.net
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2784-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 2196 ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2196 set thread context of 2784 2196 ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2784 ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2784 2196 ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2784 2196 ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2784 2196 ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2784 2196 ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2784 2196 ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2784 2196 ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2784 2196 ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5c3755ba829fe0ac168fde4f1f37ff531
SHA1e534376fcaf95c9284fb242f8b962a85783e2956
SHA25650d2bcd4477dc52e7c5dd1d2ee59a78133cb4ae3dd367aadc22053de8137a977
SHA512d55473705589e789d5f92f79cf1c7dcefb7db21976829fc036593ef5de1eaf02a0c002fc9457b65314bba33bd6a05d06e31341bb147472f2160136e189c0a30b