Analysis
-
max time kernel
93s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 21:49
Static task
static1
Behavioral task
behavioral1
Sample
19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe
-
Size
877KB
-
MD5
19e4c0e192b1966e105f7cdc815d4861
-
SHA1
201261501086a6ca7511206ebf17232af50706b8
-
SHA256
e2ab98687c215cc7f4e84d11bdcc6a83d797944132901cbbd6b1c23a47efba08
-
SHA512
9bd0a604aa0df102503e7bf9b5b70c8b7740a365009e3755ed3eca4f8da85568ed6c1fe9810f734096c667705fc1c5d3c1fe4369d47912fd90c50aeb81b1a641
-
SSDEEP
12288:YVqGUslKAn3qGaNHEyC9/oR9gy5FHK7zcRLL+UVdgYjksp/4e6xrZ9dh6tLxgvvl:YnKAPp9AR95yOLL1jkwg3xVl6tu1
Malware Config
Extracted
formbook
4.1
chad
osiribodhisattva.com
e-ticaretdostu.com
integrocapitalllc.com
pasarbb.com
curavy.com
efcomportamento.com
twittertornado.com
siyhy.com
roamnext.com
hongduen.com
urbaanmarket.com
davidcavanaghreplays.com
comperhouse.com
ne-nerede.net
m365fordevs.com
structuredadvocates.com
withalldads.love
assanamusic.info
oshaberi-machiko.com
mollyellen.net
thickermovie.com
macocome.com
acmekorea.com
qtmkyxs.icu
mobusy.com
heraskiss.com
vibetonight.com
028036.com
transinta.com
alliwell.com
wat2shop.com
digitalcom100.com
grosbeakgardens.com
mariannehoefer-krey.com
kurashisumai.com
backstreetsconsultingllc.com
afcerd.com
y0byblak.com
rtsworthitcoffee.com
gathermix.com
poocheepaws.com
luanalumertz.com
basecampresponse.com
hospitalbox.asia
gregorywise.com
jimhankeylaw.com
arkadelphiachiropractic.com
thingah.com
trickcall.com
xpowercovidshield.com
loginctr.com
lockdownmillionaires.com
opalcreative.design
stockproductionmusic.services
tekscoop.com
oasismig.com
mikecarfizzi.com
bojankezadecu.com
mfibersystems.com
bibliolit.com
88c5f07d9678.info
spcmaroc.com
nightanddayfreightsystems.net
athena-sportech.com
ssgas-ia.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2752-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4180 set thread context of 2752 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 2752 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 2752 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4180 wrote to memory of 4908 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 91 PID 4180 wrote to memory of 4908 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 91 PID 4180 wrote to memory of 4908 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 91 PID 4180 wrote to memory of 2752 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 92 PID 4180 wrote to memory of 2752 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 92 PID 4180 wrote to memory of 2752 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 92 PID 4180 wrote to memory of 2752 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 92 PID 4180 wrote to memory of 2752 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 92 PID 4180 wrote to memory of 2752 4180 19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe"2⤵PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-