Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe
-
Size
1009KB
-
MD5
c52bba22aab2fb97d79ef862350a6f7e
-
SHA1
635bfffc72aad12c87e85af14d6eec6683fc0df0
-
SHA256
44539749971b58f590567a17b718be17f01c5bd37048711215e7e75a62eb056a
-
SHA512
b1f0da6630765229ff45d861f62a209a0d6b45a28f1b112f65c947b71a5834db26097048803600a097dc0a027b0a68defc22259d5cddb1e6e3b29ecc62d0482c
-
SSDEEP
12288:vGpCJdcMRCZKGBcFg2Dt2NjFVnq0HI5tGjUqVK5EeiVPHxgSbfrUxUuB:OCJdJE3InDMNjTrHsOUHUPHxgSbzMUu
Malware Config
Extracted
formbook
4.1
chad
osiribodhisattva.com
e-ticaretdostu.com
integrocapitalllc.com
pasarbb.com
curavy.com
efcomportamento.com
twittertornado.com
siyhy.com
roamnext.com
hongduen.com
urbaanmarket.com
davidcavanaghreplays.com
comperhouse.com
ne-nerede.net
m365fordevs.com
structuredadvocates.com
withalldads.love
assanamusic.info
oshaberi-machiko.com
mollyellen.net
thickermovie.com
macocome.com
acmekorea.com
qtmkyxs.icu
mobusy.com
heraskiss.com
vibetonight.com
028036.com
transinta.com
alliwell.com
wat2shop.com
digitalcom100.com
grosbeakgardens.com
mariannehoefer-krey.com
kurashisumai.com
backstreetsconsultingllc.com
afcerd.com
y0byblak.com
rtsworthitcoffee.com
gathermix.com
poocheepaws.com
luanalumertz.com
basecampresponse.com
hospitalbox.asia
gregorywise.com
jimhankeylaw.com
arkadelphiachiropractic.com
thingah.com
trickcall.com
xpowercovidshield.com
loginctr.com
lockdownmillionaires.com
opalcreative.design
stockproductionmusic.services
tekscoop.com
oasismig.com
mikecarfizzi.com
bojankezadecu.com
mfibersystems.com
bibliolit.com
88c5f07d9678.info
spcmaroc.com
nightanddayfreightsystems.net
athena-sportech.com
ssgas-ia.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/776-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1280 set thread context of 776 1280 c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 776 c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe 776 c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1280 wrote to memory of 776 1280 c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe 91 PID 1280 wrote to memory of 776 1280 c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe 91 PID 1280 wrote to memory of 776 1280 c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe 91 PID 1280 wrote to memory of 776 1280 c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe 91 PID 1280 wrote to memory of 776 1280 c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe 91 PID 1280 wrote to memory of 776 1280 c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c52bba22aab2fb97d79ef862350a6f7e_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:776
-