Analysis
-
max time kernel
93s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
975f67ccf96e69099d84b63c56ab1f2d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
975f67ccf96e69099d84b63c56ab1f2d_JaffaCakes118.exe
-
Size
796KB
-
MD5
975f67ccf96e69099d84b63c56ab1f2d
-
SHA1
04428d3873170421b0a1efd821ec3b7366a28119
-
SHA256
b70102d1cdd3822f097da98e2068b162590de84338edc577ba7c54953b55dfe2
-
SHA512
b43857851aeab0901b521892b691d414e366ef127f71dff39c53dabffe7a294a1058cd8027b02651897bb400bc4071cbfe09cf7a9025c301c6bd54ac896b4ef6
-
SSDEEP
12288:1y5i2yxqFCYt8/vLRDDP8rZit6qeZaGRIDuTA:1yYqFCYtozRDD6ZM7f+o
Malware Config
Extracted
formbook
3.9
ap
runway27band.com
nogofarm.com
phfrontpage.info
apolloidt.com
superiorselfstoragecny.com
sharebelieves.com
schwabejapan.com
myicro.digital
quesodeflor.com
ar2make.com
lestudio12.com
thefilix.com
milfdating365.com
urnbet.com
fina.ltd
victoriaprrime.com
supporttechnique.directory
island-car-wash.net
devteamsix.com
zhenyusafety.com
majesticharmony.com
hkmzt.com
valrest.com
hotidea.agency
holatango.com
nicholscustomknives.com
beidianhuo.com
princeorologi.com
rmis-ltd.com
ehqstag.com
7hz3v1.info
julzupw.com
festivalstickerart.com
yanjiaojdwx.com
visotar.com
silksurface.com
pictacase.com
cnzhenfang.com
ckbwybi.com
batswithglowsticks.com
finlandsingle.site
designdewz.com
bokettobox.com
onlyforbabies.online
xrydkj.com
gaagnet.com
losingitentertainment.com
edonne.info
sharpowersports.com
right-to-object.com
dragondeity.group
boxmlands.review
gndenterprisesinc.com
steatus.com
hellowangwang.com
tinyeefx.com
rdlswkj.com
rlqtpp.ink
internetofteens.com
session.ink
carrozzeriatrastevere.com
capacityrod.science
chuangyoukeji.com
topdepeliculas.com
dotcex.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4808-5-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2712 4808 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
975f67ccf96e69099d84b63c56ab1f2d_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 975f67ccf96e69099d84b63c56ab1f2d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
975f67ccf96e69099d84b63c56ab1f2d_JaffaCakes118.exepid Process 4808 975f67ccf96e69099d84b63c56ab1f2d_JaffaCakes118.exe 4808 975f67ccf96e69099d84b63c56ab1f2d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
975f67ccf96e69099d84b63c56ab1f2d_JaffaCakes118.exepid Process 4808 975f67ccf96e69099d84b63c56ab1f2d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\975f67ccf96e69099d84b63c56ab1f2d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\975f67ccf96e69099d84b63c56ab1f2d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 7642⤵
- Program crash
PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4808 -ip 48081⤵PID:1092