Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe
-
Size
764KB
-
MD5
ed67a014369cbf061b4464b77c3765c0
-
SHA1
ee4eccd455b179d3b62aa5b813d6def9f40d0f67
-
SHA256
85dc1d019667588686df02bc9e2ab3b40730bc826404669e0c2c70b27d679407
-
SHA512
3d8e06276fd9eef01d50c756e8bdea6c5fd4220defc1e793c8c6078babaab630f676b0e7b06d7f32ef6cad24dd5667759dcdbb27dd62e7e861b6da39bc3e61d3
-
SSDEEP
12288:AYIjfe/f3oHPabS8qV/z2cuDqZxZYYut:AY733oHyrq9z2G
Malware Config
Extracted
formbook
3.9
pe
blackcatproud.com
kddgu.info
jhholiday.com
woshunwang.com
qrvou.info
yinuojie.com
404arabs.com
diaojieorg.com
hsyfjj.com
medusabotanicals.com
ghay5c.com
wm785.com
bikeandart.com
ygyroadside.info
whitewings.biz
4pointpartnersbv.com
tukangsedotwc.net
democrataward.com
systemtraffic2updating.win
thevlu.com
wbwxfw.com
angeladiscountmall.com
sisarservices.com
bajaringantangerang.com
betwin0000.com
spectrumreachdata.com
czzzw.com
aquaristik-ratgeber.com
caroloverland.com
heartygiftz.com
wanli118.com
ellieenichen.com
xn--fiqs8sxwbx9y.com
sergunsolarmarket.com
shuyiren.com
allsystemsupgradesnew.review
radiomenina.com
dbsdgc.link
fudaoshidai.com
bankratestoday.com
birch.media
saddesklunchclub.com
heretale.com
nela-art.com
koolmugz.com
recruitmydigitalpeople.guru
isitstable.com
sthonghu.com
savewithdaverna.com
netmaniacs.net
super-disco.com
desibazao.com
kdframingdrywall.com
rescuingtheperishing.com
silo.fund
mailitunes.com
china6ix.net
zohulu.com
computeremporium-mail.net
vfhzaogjgu.info
yysajp.com
buypropecia-generic.com
cryptbooks.com
gewoongoede-atikels.info
xymakdoc.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3488-4-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3516 set thread context of 3488 3516 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3488 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 3488 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3516 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3516 wrote to memory of 3488 3516 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 82 PID 3516 wrote to memory of 3488 3516 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 82 PID 3516 wrote to memory of 3488 3516 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 82 PID 3516 wrote to memory of 3488 3516 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 82 PID 3516 wrote to memory of 3488 3516 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 82 PID 3516 wrote to memory of 3488 3516 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 82 PID 3516 wrote to memory of 3488 3516 ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-