Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe
-
Size
757KB
-
MD5
bba69ef899bbaf731a772822effe289d
-
SHA1
d01d741576cf27ecc50127ca4cfe8fe239d57172
-
SHA256
1605e5cefed723f378f8bd1709dfe744029116bfe93c09c5db8bd1600fcbafd8
-
SHA512
4fe13607e07133f387768e566a7746b593007687448aa88b4246512ff6e9b789d243ef31d75b423087ad0368fd83e84f1a5cbe206d0bf56f00699c8548f095a6
-
SSDEEP
12288:uIpPtYaerJWUF826kr+iq7oDhEz6vefBavJzrDip6MAXbgYDOaYaer:uEMrJAkrCOhE/kvJzHip6MAXkYDmr
Malware Config
Extracted
formbook
4.1
jf9f
attorneyscottrynecki.com
vzedhicvg.com
bacca888.com
brevillesales.life
elysiumvrtours.com
dcmbrokersfund.com
fstrly.com
lhsrnw.com
elstin.net
streamnoya.com
ethersadvertising.com
wang0911.com
manh.business
benefits.homes
anthemcommunications.net
silkenhills.com
niallmorgaphotog.com
colegio-hispano.com
newarkphotobooth.com
cuahangtuchonbaoan.com
primalembodiedwisdom.com
besolutionsserviceshomecare.com
homebuyereducation.net
lspdigitalmarketing.com
jzsgsnc.com
desimallhd.com
historiasycosas.com
lltbd.com
bigbrandmaker.com
jacketsemporium.com
marbellelingerie.com
responsiblechocolate.com
amane-crystal.com
xxxsnapit.com
subletteranch.com
nuvotehome.com
h-0001.com
cct-ep.com
tomteaching.com
speedsnearme.net
appleblosssomliving.com
manage-funds.com
atcapparels.com
thefreedomvillage.com
afcerd.com
g-cia.com
bodainesycarlos.com
visage-aesthetics-london.com
yasamrotasi.net
davidbmccann.com
mercedezstamp.com
wing.rent
prosperwfh.com
miathesuperstar.com
sibdog.com
hnclife.net
waxremovo.com
dad.place
clarkfuneral-homes.com
bjymrq.com
jjtyf.com
cityserviceasphalt.com
livininthemess.net
surtimassv.com
hydraruzxpnew4af.asia
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2088-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bba69ef899bbaf731a772822effe289d_JaffaCakes118.exedescription pid Process procid_target PID 1548 set thread context of 2088 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bba69ef899bbaf731a772822effe289d_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
bba69ef899bbaf731a772822effe289d_JaffaCakes118.exebba69ef899bbaf731a772822effe289d_JaffaCakes118.exepid Process 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 2088 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bba69ef899bbaf731a772822effe289d_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
bba69ef899bbaf731a772822effe289d_JaffaCakes118.exedescription pid Process procid_target PID 1548 wrote to memory of 2560 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 30 PID 1548 wrote to memory of 2560 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 30 PID 1548 wrote to memory of 2560 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 30 PID 1548 wrote to memory of 2560 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 30 PID 1548 wrote to memory of 2720 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 31 PID 1548 wrote to memory of 2720 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 31 PID 1548 wrote to memory of 2720 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 31 PID 1548 wrote to memory of 2720 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 31 PID 1548 wrote to memory of 2088 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 32 PID 1548 wrote to memory of 2088 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 32 PID 1548 wrote to memory of 2088 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 32 PID 1548 wrote to memory of 2088 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 32 PID 1548 wrote to memory of 2088 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 32 PID 1548 wrote to memory of 2088 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 32 PID 1548 wrote to memory of 2088 1548 bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe"{path}"2⤵PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe"{path}"2⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\bba69ef899bbaf731a772822effe289d_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-