Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 09:11
Static task
static1
Behavioral task
behavioral1
Sample
09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe
-
Size
726KB
-
MD5
09ef9306539a1cd532d9985f3a2856a6
-
SHA1
3b2c26fff9fbdd0f44eb7d06400c7b0db5c2241b
-
SHA256
9b47637ecdf8e69614cb8ab22f9bddc0cc1719eca7f6ae87b0e988b9fb1cfdce
-
SHA512
e25d7ac4323e52ad13e9f9729f3a626f2d325d5990a0687fd1f59b87e06b9bca107c2fe5ac12c3a7c1dd92342c2b0887271f101dfd721f862b83de1048c5960b
-
SSDEEP
12288:jXfpEdonTdVMYlCZ/PbrabB5wCeSS6l/r1HWW6uPh7zZh5:jXfpEdonTdu8a/PbrkB5wVSBl/r1HWWP
Malware Config
Extracted
formbook
3.8
private
evilunderworldmall.com
davidovicmirko.com
incrediblechildrenscostume.com
langsgo.com
ibex-japan.com
findhotel.coupons
logo8536.com
meyerparkdental.com
digitaltoken.exchange
chatramuetaiwan.com
yulibao.net
michaelandcolaw.com
sapeur-hairfactory.net
louisianamodernsmiles.com
finleighelderton.com
knlwpaj.download
directorionacionaldesalud.com
sdasdfasdfasdf45.com
hefeihuli.com
woxa.ltd
daisymejia.com
performiles.win
eldrqs.online
becharrisbasketball.com
khsalon.com
simplysassygifts.com
mobilitiamoci.com
tfcmag.com
nordicfurnituregroup.online
quotelotus.com
arte-busca.com
gutsonmarketing.com
aaronlosty.com
underfood.com
puyuanfabu.com
mindybrowndc.com
looimail.com
envycustomdesigns.com
tienmanhtien.com
texaspetpantry.info
thelouzanperfumes.com
winboxs.com
hydragrc.com
6462644.info
e01k0m.info
xmzytx.com
ohnm3.info
carental-ltd.com
phonecasery.com
eavanmcsweeney.com
psflowers1.com
adaione.com
zrvhfc.top
edjamesphotography.com
aidanpawson.com
shoeonlinestores.com
cuibida.net
bebidasaltoimpacto.com
ordosglrl.com
palatine.house
thosedirected.com
printerpoqe.men
tistory2.com
365lafei.com
lossubway.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4548-5-0x00000000051F0000-0x000000000521A000-memory.dmp formbook behavioral2/memory/3492-11-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4548 set thread context of 3492 4548 09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe 82 PID 3492 set thread context of 3256 3492 RegAsm.exe 55 PID 4456 set thread context of 3256 4456 systray.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4548 09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe 4548 09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe 3492 RegAsm.exe 3492 RegAsm.exe 3492 RegAsm.exe 3492 RegAsm.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe 4456 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3492 RegAsm.exe 3492 RegAsm.exe 3492 RegAsm.exe 4456 systray.exe 4456 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4548 09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe Token: SeDebugPrivilege 3492 RegAsm.exe Token: SeDebugPrivilege 4456 systray.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4548 wrote to memory of 3492 4548 09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe 82 PID 4548 wrote to memory of 3492 4548 09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe 82 PID 4548 wrote to memory of 3492 4548 09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe 82 PID 4548 wrote to memory of 3492 4548 09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe 82 PID 4548 wrote to memory of 3492 4548 09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe 82 PID 4548 wrote to memory of 3492 4548 09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe 82 PID 3256 wrote to memory of 4456 3256 Explorer.EXE 83 PID 3256 wrote to memory of 4456 3256 Explorer.EXE 83 PID 3256 wrote to memory of 4456 3256 Explorer.EXE 83 PID 4456 wrote to memory of 3520 4456 systray.exe 84 PID 4456 wrote to memory of 3520 4456 systray.exe 84 PID 4456 wrote to memory of 3520 4456 systray.exe 84
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\09ef9306539a1cd532d9985f3a2856a6_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3520
-
-