Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
ec040a29055a7a7fb054c05095970082_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ec040a29055a7a7fb054c05095970082_JaffaCakes118.exe
-
Size
288KB
-
MD5
ec040a29055a7a7fb054c05095970082
-
SHA1
8c1d5984938ec48f63d3c487857e1e86e104bad3
-
SHA256
8229552b02fb2542bc78668c71bd9fd71b735735778948cf467c5740197bbe01
-
SHA512
137062bf73e119a0856e90c8fa323ffd11438a8d64843f1637a5fd61db2fd03026ef832330d547cc04e34c9f2280d97e359f89f045cb8f73cddc8b9fa4412503
-
SSDEEP
6144:cHeoFv/oW+0jDkRdBnvsLEV5ypPAOkeC:c+WXppW0LEV5yXC
Malware Config
Extracted
formbook
3.9
main
ericspanton.com
reptilelog.com
tv18075.cloud
zifo.ltd
funkyrevival.com
beyondlashesboutique.com
leyi366.net
lumenixfabrika.com
com-appswebsauthorizes.info
filmstreamvf.agency
petftnder.com
btctrader.win
metzger4.win
zexcqz.com
618yiq.info
dralirizaicel.com
alphabarn.com
jingziorg.com
homewardlive.com
byrife.com
lovemypolo.com
pifirmsi.com
k309ps59.com
lifepornx.com
flatlander.online
littlecherishedmoments.com
popeast.review
easyhorny.com
jualreadymix.com
jiedaishuju.net
thebigandfree4updates.date
altustrainingcrashpads.com
tofulady.com
redesigningyourmind.info
zamosanimations.com
asyncboulevard.net
xn--drr480h.com
zggongzuoquan.com
lepaipai8.com
john668.com
hshengshuibeixin.com
eldelvideo.com
expertresidentialservices.com
supreme-export.com
puupbags.com
hucksterlondon.com
sparklingbacteria.com
myopiekunki.com
sriadvertising.net
kumawatart.com
xn--q6qy6xvwesuh.com
outsourceyourpro.com
koopeenbbq.com
tetdoclap.info
luonrehon.com
yuxianfa.com
cococomputing.com
northernlights.network
artwork-uno.review
malcolmandmikael.com
10gggg.com
hk0955.com
christmaslightsunlimited.net
xfactorauditions.com
et.in
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1580-5-0x0000000000400000-0x000000000044C000-memory.dmp formbook -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec040a29055a7a7fb054c05095970082_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1580 ec040a29055a7a7fb054c05095970082_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1580 ec040a29055a7a7fb054c05095970082_JaffaCakes118.exe 1580 ec040a29055a7a7fb054c05095970082_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1580 ec040a29055a7a7fb054c05095970082_JaffaCakes118.exe 1580 ec040a29055a7a7fb054c05095970082_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1580 ec040a29055a7a7fb054c05095970082_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec040a29055a7a7fb054c05095970082_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec040a29055a7a7fb054c05095970082_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1580