Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe
-
Size
363KB
-
MD5
98b7b0e6a8b0364de5fe1ba86b7c6bfd
-
SHA1
762bb698218c43e1aa722cb518e542184d439093
-
SHA256
c74a1ee1bb642221d811a5c617c175c09bca2cf5d6937f7981b9825eab5ef127
-
SHA512
e21731fb5edda7567fb3acbf4ed43176e768c309cde67b48b9c13942f77d3c91b635463c795d6fca00f8589436bf9bc1287e2ffa8a4176805a05a6ae5776b878
-
SSDEEP
6144:fKCmflvhYuh+7ddSZkaNGRkVpidh1XlL8BW48UWSFltIkb3IpWiAjT:fKCmNvhYuh+7+ZIRkV2tlyWaWSHp3I8b
Malware Config
Extracted
formbook
4.1
dd2v
jkrqzmeyd.icu
cbluedottvwdshop.com
yhchen.space
premierhealthnwellness.com
szkuyaju.com
harvestmoonloans.net
dadematerial.com
mariaclarahairstudio.com
hwunvy.online
puloutjbmere.com
kossu1989.com
dubbedos.com
ncylis.com
hybrid-sol.com
travelature.com
gracefulcounts.com
66secretgarden.com
eslonyourcell.com
wisersponsorship.com
sepn3.com
mozambiquematrimony.com
valvulasyconexiones.com
drinksupercofee.com
universe-direct.com
alvesdeabreu.info
sitepew.life
tentenflower.net
jqclean.com
lotusinplay247.com
safaricaretransportation.com
bosscheschool.com
rentahome.online
syeddropship.com
dsavohv.icu
mainspaceforcontenting.club
onlinemedsus.com
getueaqaredre.com
raregirlgem.net
cohenone.com
luxsot.com
levelupbbqcleaning.com
bttjagalan.xyz
nisheying.com
2299diamond301.com
soilfoodwebofcolorado.com
postcomanetwork.com
directivewellness.com
adewalesolarin-maths.com
kumarendran.com
wgan3rdpartyserviceprovider.com
kidsclothing.center
lielm.com
codebcodeenforcement.net
cash4monero.com
greatlookingmom.com
laconices.com
q99f.com
olimpobarberiaspa.com
urockoffroad.com
bestselfcoachingforfitpros.com
collectionbypaty.com
hindustanpu.com
atlerz.com
strategyonerealty.com
fortmyerscruisevacation.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2368-3-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2368-6-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1260 set thread context of 2368 1260 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 83 PID 2368 set thread context of 3416 2368 svchost.exe 56 PID 4832 set thread context of 3416 4832 WWAHost.exe 56 -
Program crash 1 IoCs
pid pid_target Process procid_target 2864 1260 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WWAHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2368 svchost.exe 2368 svchost.exe 2368 svchost.exe 2368 svchost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe 4832 WWAHost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1260 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 2368 svchost.exe 2368 svchost.exe 2368 svchost.exe 4832 WWAHost.exe 4832 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2368 svchost.exe Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeDebugPrivilege 4832 WWAHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2368 1260 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 83 PID 1260 wrote to memory of 2368 1260 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 83 PID 1260 wrote to memory of 2368 1260 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 83 PID 1260 wrote to memory of 2368 1260 98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe 83 PID 3416 wrote to memory of 4832 3416 Explorer.EXE 87 PID 3416 wrote to memory of 4832 3416 Explorer.EXE 87 PID 3416 wrote to memory of 4832 3416 Explorer.EXE 87 PID 4832 wrote to memory of 3404 4832 WWAHost.exe 92 PID 4832 wrote to memory of 3404 4832 WWAHost.exe 92 PID 4832 wrote to memory of 3404 4832 WWAHost.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\98b7b0e6a8b0364de5fe1ba86b7c6bfd_JaffaCakes118.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1260 -s 3563⤵
- Program crash
PID:2864
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1260 -ip 12601⤵PID:2188