Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe
-
Size
571KB
-
MD5
f7ad3b59548788a59172b6477a1b83f0
-
SHA1
3b042b49ac135f38824de3665a051a7631e98782
-
SHA256
f22a0b5b12687ae12b9f4d625d82a16562bce5e1b03b7d7372df3813e5afc8e5
-
SHA512
039ea0297abbf3200d145790f0fccc0e4ae8ddb6e2eb75021781c4c131494398602d4f80f65d4878c419e0c35a0368acc17d626affec868ac04c69687d2db341
-
SSDEEP
12288:ECGb2I5hQeMda6UYZoqNh+8LzxdYlBxg/pngR7:tGbVxMWqVNtvxdYPxgg
Malware Config
Extracted
formbook
4.1
dfc
photographytune.com
oleandrinbotanical.com
hibcapital.com
katgermosen.com
careerwomensgol.com
oliverezechi.net
hrbhrt.com
codeopulence.com
merrilllynchph.com
globallionsco.com
cutass.com
sarahalhashemi.com
izzyandi.com
snacklabbet.com
manufaktura-uyuta.online
powayvotes.net
helpspine.com
arlto.info
sofakingwet.com
cretanhandcarving.com
inspirationslines.com
testandtagauckland.site
chelsescompass.com
affordableplumbing.services
valencn.com
cyber1derer.design
rajitirir.icu
solepairllc.com
v3purehealth.com
yeaptech.online
zhadzc.com
carrcommercialcleaningsvc.com
sanfranciscord.com
oralie.club
xn--marlimone-boutique-jwb.com
founderfever.com
veradreamsofthesea.com
drewbaba.com
vet-planet.com
artsuite.net
lighthousebait.com
buy-acrylic-paintings-art.com
getfinched.com
infinixinfo.com
xjyanyuan.com
xaoikevesesede.com
mobility-personalberatung.com
agelishi.com
creditresolutiongroup.com
cooperationnitrogen.life
thetwinsday.com
eltallerdelinge.com
sisportaldeadesao2020.com
yidaicelue.com
mystrongart.com
edwardreid.net
zoeyrosen.com
ghesreji.icu
canopyhealthphysiciansgroup.com
universolofi.com
comtacti.com
park432.com
marbbo.com
220hartstene.com
damcol.info
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2656-5-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2656-9-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2988 set thread context of 2656 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 31 PID 2656 set thread context of 1232 2656 RegAsm.exe 21 PID 2348 set thread context of 1232 2348 cmmon32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2656 RegAsm.exe 2656 RegAsm.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe 2348 cmmon32.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2348 cmmon32.exe 2348 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2656 RegAsm.exe Token: SeDebugPrivilege 2348 cmmon32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2728 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2728 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2728 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2728 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2728 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2728 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2728 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2656 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2656 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2656 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2656 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2656 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2656 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2656 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2656 2988 f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe 31 PID 1232 wrote to memory of 2348 1232 Explorer.EXE 32 PID 1232 wrote to memory of 2348 1232 Explorer.EXE 32 PID 1232 wrote to memory of 2348 1232 Explorer.EXE 32 PID 1232 wrote to memory of 2348 1232 Explorer.EXE 32 PID 2348 wrote to memory of 1724 2348 cmmon32.exe 33 PID 2348 wrote to memory of 1724 2348 cmmon32.exe 33 PID 2348 wrote to memory of 1724 2348 cmmon32.exe 33 PID 2348 wrote to memory of 1724 2348 cmmon32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7ad3b59548788a59172b6477a1b83f0_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-