Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 10:40
Static task
static1
Behavioral task
behavioral1
Sample
fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe
-
Size
493KB
-
MD5
fe5a7f1c4f9c4924c8f99fedac5b5fc3
-
SHA1
9d4ed513769ee036b3e93c14585af94dbb7f9dd0
-
SHA256
b69927fbfd7eb038b59aa9b7e9f49cb02d127d48fcf6517e65a379e982e806bc
-
SHA512
ac0e2006ce9c85aac4e6f8fbce7fdf827202c67bc6806919d496d5b9b0fdfc452b397dc76ee0b28be31444b0bc58a2c05750dac4b55bc260f74f983c52cff0db
-
SSDEEP
12288:jaz6hGWLY69Lw8/FpQXc8PAZGRMfmkAEMZp7:5LYgLwoFpQM84ZR+aM
Malware Config
Extracted
formbook
4.1
gbr
serabet.com
galanggroup.com
zweitmeinung-urologie.com
damsalon.com
binliwine.com
lifeladderindia.com
flyingwranchmanagement.com
tripsandturns.com
3headdesign.com
aluminumfacade.com
toprestau.com
facetreatspa.com
periodrescuekit.com
dbaojian.com
altinotokurtarma.com
gkpelle.com
loguslife.com
treatse.com
lghglzcnkx.net
jawharabh.com
planterboxgardener.com
douyzqdsgl.com
bestofselling.com
carbeloy.com
haok.net
mymailtek.com
itsabossthing.com
peoplesdao.com
bhumarealestate.com
otugxixd.icu
amongugadu.com
jemadrekre.com
nikber.com
genomicsmaster.com
firstbyphone.com
arogyamfarms.com
outletamigo.com
musannafashion.com
dtrixxx.com
quickandeasygroup.com
rawhustleapparel.com
care.land
charmingoneboutique.com
xn--fllessang-g3a.com
trendandjobs.online
voxmediation.com
alkawtherabudhabi.com
peeledeye.com
mcgillfamilylaw.com
prokit.net
my-safebaby.com
bookatalia.com
utilking.com
jhondavid.com
onpassivewithval.com
gtelemed.com
playfighterstube.com
bestfreezerstorage.com
kichnpro.com
sanjeevanicreation.com
allturdsmatter.com
picklebarreldillivers.com
clinversity.com
keystogce.com
bistrolartichaut.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/396-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4072 set thread context of 396 4072 fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 396 fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe 396 fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4072 wrote to memory of 396 4072 fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe 91 PID 4072 wrote to memory of 396 4072 fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe 91 PID 4072 wrote to memory of 396 4072 fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe 91 PID 4072 wrote to memory of 396 4072 fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe 91 PID 4072 wrote to memory of 396 4072 fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe 91 PID 4072 wrote to memory of 396 4072 fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe5a7f1c4f9c4924c8f99fedac5b5fc3_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-