Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe
-
Size
363KB
-
MD5
98b7b0e6a8b0364de5fe1ba86b7c6bfd
-
SHA1
762bb698218c43e1aa722cb518e542184d439093
-
SHA256
c74a1ee1bb642221d811a5c617c175c09bca2cf5d6937f7981b9825eab5ef127
-
SHA512
e21731fb5edda7567fb3acbf4ed43176e768c309cde67b48b9c13942f77d3c91b635463c795d6fca00f8589436bf9bc1287e2ffa8a4176805a05a6ae5776b878
-
SSDEEP
6144:fKCmflvhYuh+7ddSZkaNGRkVpidh1XlL8BW48UWSFltIkb3IpWiAjT:fKCmNvhYuh+7+ZIRkV2tlyWaWSHp3I8b
Malware Config
Extracted
formbook
4.1
dd2v
jkrqzmeyd.icu
cbluedottvwdshop.com
yhchen.space
premierhealthnwellness.com
szkuyaju.com
harvestmoonloans.net
dadematerial.com
mariaclarahairstudio.com
hwunvy.online
puloutjbmere.com
kossu1989.com
dubbedos.com
ncylis.com
hybrid-sol.com
travelature.com
gracefulcounts.com
66secretgarden.com
eslonyourcell.com
wisersponsorship.com
sepn3.com
mozambiquematrimony.com
valvulasyconexiones.com
drinksupercofee.com
universe-direct.com
alvesdeabreu.info
sitepew.life
tentenflower.net
jqclean.com
lotusinplay247.com
safaricaretransportation.com
bosscheschool.com
rentahome.online
syeddropship.com
dsavohv.icu
mainspaceforcontenting.club
onlinemedsus.com
getueaqaredre.com
raregirlgem.net
cohenone.com
luxsot.com
levelupbbqcleaning.com
bttjagalan.xyz
nisheying.com
2299diamond301.com
soilfoodwebofcolorado.com
postcomanetwork.com
directivewellness.com
adewalesolarin-maths.com
kumarendran.com
wgan3rdpartyserviceprovider.com
kidsclothing.center
lielm.com
codebcodeenforcement.net
cash4monero.com
greatlookingmom.com
laconices.com
q99f.com
olimpobarberiaspa.com
urockoffroad.com
bestselfcoachingforfitpros.com
collectionbypaty.com
hindustanpu.com
atlerz.com
strategyonerealty.com
fortmyerscruisevacation.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1012-4-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1012-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1640 set thread context of 1012 1640 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 31 PID 1012 set thread context of 1108 1012 svchost.exe 20 PID 2548 set thread context of 1108 2548 systray.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1012 svchost.exe 1012 svchost.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe 2548 systray.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1640 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 1012 svchost.exe 1012 svchost.exe 1012 svchost.exe 2548 systray.exe 2548 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1012 svchost.exe Token: SeDebugPrivilege 2548 systray.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1012 1640 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 31 PID 1640 wrote to memory of 1012 1640 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 31 PID 1640 wrote to memory of 1012 1640 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 31 PID 1640 wrote to memory of 1012 1640 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 31 PID 1640 wrote to memory of 1012 1640 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 31 PID 1108 wrote to memory of 2548 1108 Explorer.EXE 32 PID 1108 wrote to memory of 2548 1108 Explorer.EXE 32 PID 1108 wrote to memory of 2548 1108 Explorer.EXE 32 PID 1108 wrote to memory of 2548 1108 Explorer.EXE 32 PID 2548 wrote to memory of 2352 2548 systray.exe 33 PID 2548 wrote to memory of 2352 2548 systray.exe 33 PID 2548 wrote to memory of 2352 2548 systray.exe 33 PID 2548 wrote to memory of 2352 2548 systray.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2352
-
-