Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
9e59d98eed0bd959f1f5d2ba36e92859
-
SHA1
d4ebcdefbec753e3074f81f58f067e8545d5bb95
-
SHA256
3c274255e35e340152ba94463f4b27e0f5f2554062abc27b4ec4d3389545379a
-
SHA512
24e0a82c24431bca83b39b7c4d30972d2c9023d2cee7a2e2d18732a7f0f39389be036b5debc76c0eacd578b0a9edf62c9eb076338e32a1601a87dd11ddf8edbf
-
SSDEEP
24576:FSkLO1suaWgV27G0ubgrdCq5/RHAZZS5R09n9Y:FSj1KrV8G7SE3B99
Malware Config
Extracted
formbook
4.1
kgdh
socialsecuty.com
rossiniconstruction.com
baliisterstore.com
walnuthotsouce.com
herculesmile.com
datum-maps.tech
yourhandhistory.com
reevolvehardware.com
condosandresorts.com
boissonsenergetiques.com
everybodymatters.club
titoly.com
knfsupplies.com
azitajovaini.com
orfilashop.com
aliceramsay.com
tipsyfetes.com
besttrip.store
ukrainianlandtoken.com
jdscornerbar.com
sortofopinion.com
facialhq.com
trolleyboyretail.com
bettla.com
healthgroupactive.com
washingtonsqapartments.com
energiadoser.com
rpas.one
vtnywvebs.club
lesspricesale.com
profininc.com
roninkits.com
saintduck.com
odziez-reklamowa.com
topchoicedebtzero.com
eleutheraevents.com
pmmfddd.com
mehranagoldgallery.com
kupolinkshell.com
thevesta.pro
yescoment.com
metrotreasurybanks.com
bbluebeltlivewdshop.com
1motivational.com
burseomde.com
viaqraonllne.com
myhomedecorations.com
roundenglish.com
streamableav.com
manukaskinco.com
phukientrangsuc.com
guatemalamasks.com
gopeer.online
coloradocowboychili.com
azmayesh.academy
locdessntls.com
violentarchitectures.com
wasatchcarclub.com
eliteconcrete.pro
samferrer.com
define.digital
jokysun.com
scrapsandfun.com
versiontechnology.net
totemosuguremono.online
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1336-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exedescription pid Process procid_target PID 3672 set thread context of 1336 3672 9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exepid Process 1336 9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe 1336 9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exedescription pid Process procid_target PID 3672 wrote to memory of 1336 3672 9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe 99 PID 3672 wrote to memory of 1336 3672 9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe 99 PID 3672 wrote to memory of 1336 3672 9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe 99 PID 3672 wrote to memory of 1336 3672 9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe 99 PID 3672 wrote to memory of 1336 3672 9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe 99 PID 3672 wrote to memory of 1336 3672 9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-