Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 17:06
Static task
static1
Behavioral task
behavioral1
Sample
f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe
-
Size
799KB
-
MD5
f0420dfdd25909430646c7655e25415e
-
SHA1
422040f4bf9d36a4f3aac60b07905f3b95f353cf
-
SHA256
a9a23a0d9df00e223a3c3b5c9ab750ae576b3217752e7a054435291b4d10a970
-
SHA512
f2b8eb6abc4e70e375fc805b7ffa409c702bb7f62ea68c24f500cb0a6b44c5f0d65c1e85fa2470b63ee346520ecf468d52094985d1c39a908bbd4132a3cc56e4
-
SSDEEP
12288:AYHdm1fBr+IwICEMytGbPGcbXDbE1Qla6RgVcP/7kvDxul+6Qw5Eq1uJ2:AyAiIlCPtfIv9XME22
Malware Config
Extracted
formbook
4.1
cza
truenorthentic.com
napgames.net
xn--fjq771n.com
wagnerprintconsult.net
spate.info
kids4thekingdom.com
ateconstruction.com
sort-regulation.com
vesselfulinflation.com
kalhanifi.com
veronews.info
worldinwinston.com
adornbymk.com
resources4u.online
pepinaerospace.com
tamaraarmendariz.com
xn--hck5aza9o8c.online
nomadicgastronomy.net
margaritasandmotherhood.com
vip51633.com
princeuzochi.com
williink.com
hangoverheros.com
ecommercebuilding.com
k306w8vb.site
onebigbeautifulhotmess.com
garagegymbuilders.com
exatora.men
dkipartners.com
bodhi-serene.com
xnflshop.com
lesbienfaitsdubio.com
yimengcar.com
slindy.com
92edgerstouneroadprinceton.com
devopsclasses.online
thetechietronics.com
consortiasearch.com
thekalpatruyashodanandheri.com
vietamy.com
charlieandclaire.com
clubdelsonido.com
heybud-cannabis.com
dannihan.com
xgxtc.com
forwarundation.com
niamitmir.com
vmuhb.com
ddluav96.com
somextec.com
666lixin.com
cqd.ink
jhuwexncg.info
inlovetalk.com
melinaspina.online
klconstructors.net
ownskiatook.com
troybly.com
atnasignatureadministrators.com
plutoniumfund.com
carolearnest.com
valterallen.com
52jiujiu.top
908ka.com
nacemo.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4452-3-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4960 set thread context of 4452 4960 f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4960 f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe 4960 f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe 4452 f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe 4452 f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4960 f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4452 4960 f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe 82 PID 4960 wrote to memory of 4452 4960 f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe 82 PID 4960 wrote to memory of 4452 4960 f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0420dfdd25909430646c7655e25415e_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-