Analysis
-
max time kernel
96s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 10:48
Static task
static1
Behavioral task
behavioral1
Sample
b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe
-
Size
700KB
-
MD5
b0c1602dbb50fc0176f12b13a5b0f488
-
SHA1
0cda636c741659c4da49cec32825c51da7a2aad7
-
SHA256
33de0b92d4271914e3525fff936097d35cb6cb96ed21b0ff0d2970d9c67d4872
-
SHA512
17da91f0fa8eaa3f435d44ead5b0f708b45de377176cb62ab1d318ea35e404641ff809357d16fdebb6a7bdf40a10048f6dcbf4f3ea7fd87e834d0a5950260163
-
SSDEEP
12288:gzbQ+X8+UiDLbRHahwUOJXfoQLaxCvqin9tDmdv3x26xTKPCGJ:gzbQ+X8+UiDLbRHahwUgXfoNMTC/xLT2
Malware Config
Extracted
formbook
4.1
m8g0
trypapaya.pro
instructorcornernet.com
techadvisorsfl.com
raunnan.com
filestune.com
learnitanywhereskills.com
beaullife.com
getcovidwear.com
tkrbeautyinstitut.com
lisaphamkhai.com
iconicdds.com
ksoopawlas.com
testosteron.store
jctaketwo.com
awexz.online
onlinening.com
steelwerkschicago.com
lukakordic.com
expertsofcoaching.com
dashcca.com
xn--demiatdirecto-1ib.com
yuhongicm.com
portlandsiege.com
academysta.com
blackwiremedia.com
kent-ro-service.com
awmarkets.com
speleatherware.com
rehabcenters.space
jioscircle.com
sinijitu.com
analyticsyoda.com
shlqjt.com
bikramyogamarietta.com
crowncasino9.com
smokin-balls.com
shirasu-clinic.com
856379912.xyz
ckatesting.club
dideqsa.com
goodreporters.com
bromosyon.com
ilkonceyayincilik.com
domennyarendi32.net
thegrowthinn.com
qsgasia.com
venolbolivia.com
myhalloweengift.com
deeparchivesport.com
stiltedstories.com
btcdonation.info
little-darling.com
maximumpotentialfitness.net
iading.com
datingwithgusto.com
abncustompainting.com
cropadvisorjobs.com
nanoring.info
best-practice-gastro.com
sellitech.net
mixonsolutions.com
throughthelineagency.com
gtat.pro
relicstudios.net
psicologarenatacruz.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1296-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exedescription pid Process procid_target PID 1916 set thread context of 1296 1916 b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exepid Process 1296 b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe 1296 b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exedescription pid Process procid_target PID 1916 wrote to memory of 1296 1916 b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe 91 PID 1916 wrote to memory of 1296 1916 b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe 91 PID 1916 wrote to memory of 1296 1916 b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe 91 PID 1916 wrote to memory of 1296 1916 b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe 91 PID 1916 wrote to memory of 1296 1916 b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe 91 PID 1916 wrote to memory of 1296 1916 b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296
-