Analysis
-
max time kernel
135s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 22:35
Static task
static1
Behavioral task
behavioral1
Sample
1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe
-
Size
659KB
-
MD5
1529e24878b76569a00a6ace946b26c3
-
SHA1
4b34d00d51163df2fd910af7f8090d4395e02d2b
-
SHA256
e16d387101d1434664447f49429575cc204e9314c911b6e6f0bbbd61ed15de0d
-
SHA512
14d8bbd0efe8e06367dca4bd834444ad25472c42c4dc3fb6cacc7a721d94414f5738844e39edc2305c944f0f559bc1d653a6999d187171c563cbc46a3006d54e
-
SSDEEP
6144:EfI6LkHEjyKPPPPPPPZWSMPoCpI4n8ZCw0I4n8ZCwxWGGM2LfDrja6GS0rOGecru:CMkudPoCIVZYIVZ52DDrj5J0bJe1
Malware Config
Extracted
formbook
3.8
hx230
survivalrule.com
xnthtdme.com
toddwhitefilm.com
agmates.com
dayspaqueenstown.com
anuariosdigitales.com
nationalscenictrails.com
novamoda.store
ronaldasimpson.com
congressogerontologia.com
hotelsirius.biz
lingotown.net
kingporn.accountant
oceano.cloud
intimoecasabiancheria.com
meindikai.com
vanillapdf.com
sngyyw.accountant
chapelhillsurvey.com
www719678.com
lesliesrealestate.com
yearcelebrations.com
parquedaserra.net
yd1one.loan
dnielaughtvo.win
wshlzz.com
forex2all.com
coinmarketscanner.com
freemakeupsets.com
listedresults.com
promindustrialeholding.com
seekarthritic-relief.live
prmarketingbranding.social
edgewoodfootball.com
officercharlie.com
intacfund.net
studio-allie.com
prissystyle.com
hs9s34g54t.com
gettipped.com
20170815.com
michaelandhove.com
nature-o-care.com
graelbeck.com
sikto.com
louisteh.com
apexxcoastal.com
baellery.info
maryfashionmakeup.com
uzz.info
revsquarellc.com
dadiqg.com
mywedding.love
aprofootwear.com
hainanbi.com
yerelcizgi.com
vdforme.com
findmyiphone-support-map.link
greatbritishsnackoff.com
asnclassifiedads.com
allieowl.com
chucmung.win
detallesenrosa.com
swissinnovationcoast.com
available2.info
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1296-18-0x0000000000390000-0x00000000003BA000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4448 set thread context of 1296 4448 1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 372 1296 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4448 1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4448 wrote to memory of 1296 4448 1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe 89 PID 4448 wrote to memory of 1296 4448 1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe 89 PID 4448 wrote to memory of 1296 4448 1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe 89 PID 4448 wrote to memory of 1296 4448 1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe 89 PID 4448 wrote to memory of 1296 4448 1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe 89 PID 4448 wrote to memory of 1296 4448 1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe"2⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 1843⤵
- Program crash
PID:372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1296 -ip 12961⤵PID:1560