Analysis
-
max time kernel
125s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 10:13
Static task
static1
Behavioral task
behavioral1
Sample
f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
f368cd250e313612a8dfe5604aa44c16
-
SHA1
4a2cfe4b057b990f56a862e7b766e289bf526a5d
-
SHA256
267f66c96b16bd52ee383b06d728abd7f395e244cee4ab6a77caa319ae2c7996
-
SHA512
31434c49027e0049307d48e5cdda0950d865d1b0693441ad944e90d331cae62c9024988f2039fc049563d0185055ff4738774b596749014f7217c29dbf781ec1
-
SSDEEP
24576:TZzd/zy0ifLh84QPNt1MdYswzl+KC7FUTXqKdDF0eIsr4kUQcWCWtIgQowi:TZXZIA4kUZWHLQow
Malware Config
Extracted
formbook
4.1
cmsr
dahlia-dolls.com
iamawife.com
gardunomx.com
roweelitetrucking.com
asapvk.com
strategieslimited.com
healthyweathorganics.com
wedding-gallery.net
fastoffer.online
biolab33.cloud
los40delocta.com
charliepaton.com
jenpaddock.com
zzmweb.com
poetarts.com
techwork4u.com
tracylynpropp.com
rkbodyfit.site
migaleriapanama.com
cosmostco.com
johnsoncamping.com
flowfinancialplanning.com
xn--caamosdemexico-rnb.com
plusqueindia.com
wwwhyprr.com
benimofis.com
tandteutopia.com
spaintravelvacation.com
dear.services
zhiwugongfang.com
blogdavnc.com
justicefundingexchange.com
alphasecreweb.info
xitechgroup.com
kendalmountain.digital
nieght.com
pieter-janenmaaike.online
myexclusiveshop.com
love-potato.online
mondebestglobal.com
ranchlandconcierge.com
southerngraphx.com
pray4usa.info
vilchesfinancial.com
zelvio.store
zenibusiness.com
kindredhue.com
californiatacosdinuba.com
uncommonsolutionsllc.com
easy-lah.com
disciplesevents.com
856380127.xyz
zapzapgone.com
paradisgrp.com
programmerworks.info
purchasesuite.com
dorotajedrusik.com
555999dy.com
uvoyus.com
utang.net
elizabethhelma.com
noseainsight.com
simpleterior.com
casatensina.com
odysseysailingsantorini.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3512-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3512-16-0x0000000001290000-0x00000000015DA000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 3512 1760 f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3512 f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe 3512 f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1760 wrote to memory of 3512 1760 f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe 91 PID 1760 wrote to memory of 3512 1760 f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe 91 PID 1760 wrote to memory of 3512 1760 f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe 91 PID 1760 wrote to memory of 3512 1760 f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe 91 PID 1760 wrote to memory of 3512 1760 f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe 91 PID 1760 wrote to memory of 3512 1760 f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f368cd250e313612a8dfe5604aa44c16_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-