Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe
-
Size
764KB
-
MD5
ed67a014369cbf061b4464b77c3765c0
-
SHA1
ee4eccd455b179d3b62aa5b813d6def9f40d0f67
-
SHA256
85dc1d019667588686df02bc9e2ab3b40730bc826404669e0c2c70b27d679407
-
SHA512
3d8e06276fd9eef01d50c756e8bdea6c5fd4220defc1e793c8c6078babaab630f676b0e7b06d7f32ef6cad24dd5667759dcdbb27dd62e7e861b6da39bc3e61d3
-
SSDEEP
12288:AYIjfe/f3oHPabS8qV/z2cuDqZxZYYut:AY733oHyrq9z2G
Malware Config
Extracted
formbook
3.9
pe
blackcatproud.com
kddgu.info
jhholiday.com
woshunwang.com
qrvou.info
yinuojie.com
404arabs.com
diaojieorg.com
hsyfjj.com
medusabotanicals.com
ghay5c.com
wm785.com
bikeandart.com
ygyroadside.info
whitewings.biz
4pointpartnersbv.com
tukangsedotwc.net
democrataward.com
systemtraffic2updating.win
thevlu.com
wbwxfw.com
angeladiscountmall.com
sisarservices.com
bajaringantangerang.com
betwin0000.com
spectrumreachdata.com
czzzw.com
aquaristik-ratgeber.com
caroloverland.com
heartygiftz.com
wanli118.com
ellieenichen.com
xn--fiqs8sxwbx9y.com
sergunsolarmarket.com
shuyiren.com
allsystemsupgradesnew.review
radiomenina.com
dbsdgc.link
fudaoshidai.com
bankratestoday.com
birch.media
saddesklunchclub.com
heretale.com
nela-art.com
koolmugz.com
recruitmydigitalpeople.guru
isitstable.com
sthonghu.com
savewithdaverna.com
netmaniacs.net
super-disco.com
desibazao.com
kdframingdrywall.com
rescuingtheperishing.com
silo.fund
mailitunes.com
china6ix.net
zohulu.com
computeremporium-mail.net
vfhzaogjgu.info
yysajp.com
buypropecia-generic.com
cryptbooks.com
gewoongoede-atikels.info
xymakdoc.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2756-4-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 2756 2116 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2756 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2116 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2756 2116 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2756 2116 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2756 2116 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2756 2116 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2756 2116 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2756 2116 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2756 2116 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2756 2116 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-