Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe
-
Size
345KB
-
MD5
ca78d54d548798fcf44988d3a89433fd
-
SHA1
de519e152e3274523c23d58303f049509be2484e
-
SHA256
d12401aff6e577ad268923a0310d09931870ad0f5c557245376ca0487e4be96d
-
SHA512
3841d4e9ae04a2b277637f9cf0f8e18fbe1db4e7fd4ff1dbafbf82f663337113fff98cfc6f0a101922798fd69c51d33b01e5c014248f12330ec2f6cadefb43c0
-
SSDEEP
6144:idy13tEFvM4Mh/K7v97Z2gVdnkcvpkQHrsPMPVNTS8eAWn7woJQnsviWrX6O:idyT6vM4Mhy7RZvVG6fHBVNTSxAiUiWW
Malware Config
Extracted
formbook
4.1
k1rc
manchesterflowerwalls.com
hyperhostns.info
leverj.exchange
bringcovidhome.com
natalieball.com
glaseye.com
buyersmeetsellers.net
dronerealestate.net
calfwag.com
hoodhippy.com
prophunting.com
yange03.com
ffpgv.top
valengz.com
handbagsbreeze.com
excellencepi.com
iopsms.xyz
farmacykauai.com
dmarc.press
aridham.com
laive.chat
yenisarkisi.com
step1clean.com
templabels.com
zimmerkauf.com
pussyfarts69.com
crewe-tech.com
registergamers.com
yourgafflettings.com
novitadelgiorno.com
mayberrycommunities.com
boldae.com
utikejt.com
purple.gifts
findmyiphone.services
eagle-rock-real-estate.com
abundando.com
paysamba.com
4860p.com
airlinesfm.com
radiosta.com
scrippshealthprivacynotice.com
toughershop.com
xn--sllskapsdjur-gcb.com
wyattwillgetbetter.com
borwoo-packaging.com
testcomp8260.com
infomediosdigital.com
top10musicmarketing.com
gwokath.com
filledbasket.com
azaza.store
townsendcomics.net
sarahhariri.com
xn--kipinpaja-z2a.com
richmondpistolpermit.com
wildeliving.net
emmonsfororegon.com
leorisingcreative.com
teach.wine
alpha-psych.com
sans35studios.com
loty-hd.com
seekingyours.com
fbrblog.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/5044-3-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3668 set thread context of 5044 3668 ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5044 ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe 5044 ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3668 ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3668 wrote to memory of 5044 3668 ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe 86 PID 3668 wrote to memory of 5044 3668 ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe 86 PID 3668 wrote to memory of 5044 3668 ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe 86 PID 3668 wrote to memory of 5044 3668 ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-