Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe
-
Size
927KB
-
MD5
4f3166df8a983e08948f066db754bf07
-
SHA1
ae408b256eee4391535a6e965fa9df5858731b55
-
SHA256
4cc3c108df5e861d0fb0dcc7f4bcf8c7d717636204f5e0d242a316ce9475bf4a
-
SHA512
ad1b17515cba647dba74d97bd90f152bd42339962721233382692e6caa2be3fd65de5c30d7c47b711ce5f2e4fc5734fb7f0b055a8eff298e0ba0f294888bca46
-
SSDEEP
24576:HTLNnHzTuuJwS8xsniyXVVmX9IgK3KboM:HThnHzTL2DCiOcNI560M
Malware Config
Extracted
formbook
4.1
amb6
segurocars.com
rylautosales.com
xinglinjiankang.com
dantil-brand.com
sofaloffa.club
coinclub2.com
ez-pens.com
gqtlqsw.com
robotnewswire.com
ktproductreviews.com
merchbrander.com
yesonamendmentb.com
losgatoslimos.com
kristincole.art
metalmaids.online
leftcoastmodels.com
athetheist.com
jblbusrtingsale.com
chungcugiarehcm.com
renblockchain.com
bigdaddy.fish
comproliverton.pro
gzmove.com
honeythymeherbfarm.com
davinescosmetics.com
9355693.com
movinmemphis901.com
patriotsrs.net
dagelijkseschoenen.com
a-want-ad.site
theodbox.com
audioky.net
hopematthewsrealtor.com
theonlinemoneymachine.com
misakiti.com
ad-yalong.com
mikealazo.com
marianoterra.com
shivorja.com
goodvibrationswindchimes.com
pecom-deliverry.online
amlexcel.com
emeralddrumcompany.com
dalipaella.com
shopcamacci.com
xucaiwujin.com
bxs5000.com
2en1institut.com
zxzm47-wj.com
builttek.com
66400yy.com
beegraze.com
thedottedcat.com
komsah.com
4202nsacramentoav.info
88q27.com
toriengenharia.com
briscoewelding.com
brookelenzi.com
tribaltrash.com
bidtas.com
shokhorror.com
bodurm.com
333.wiki
shopjempress.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1444-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4380 set thread context of 1444 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 1444 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 1444 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4380 wrote to memory of 872 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 97 PID 4380 wrote to memory of 872 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 97 PID 4380 wrote to memory of 872 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 97 PID 4380 wrote to memory of 1444 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 98 PID 4380 wrote to memory of 1444 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 98 PID 4380 wrote to memory of 1444 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 98 PID 4380 wrote to memory of 1444 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 98 PID 4380 wrote to memory of 1444 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 98 PID 4380 wrote to memory of 1444 4380 4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe"2⤵PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4f3166df8a983e08948f066db754bf07_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-