Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe
-
Size
358KB
-
MD5
e3d2bd1833ff6c9e89f73ee2b79b2342
-
SHA1
4b93758269baff081591310df957975532d2434f
-
SHA256
18c32e90076b14e788bda6f63a4b0f5480efde6b36ef77f129cc381a2583cf39
-
SHA512
9b7f3826d0cb36b3a4ed27e000e098336cd5243a94dfdbb4f313e5417dc69e8419800b624dee681f4f069f65f6a065ce078761d14ec35d7c918000236dfff26e
-
SSDEEP
6144:wx19xfRz9RzGhN7NLcaI3d4qRo1q0cX2Jje3gsn/2Js3kbC3NDiRzXgbhrUU5OPN:wx1fFTGjRLca8d1G1q0Dgwsn/as3kW9l
Malware Config
Extracted
formbook
3.9
bd2
coffeeflyer.com
joy-cars.com
excp0st.com
pancakesandprotein.com
teenboys.info
theperfectgiftshop.net
maomao2017.com
musiclabtacoma.com
taskrit.com
pthjxx.com
114man.com
worldsjsj.com
rjpmuztrygwn.online
casinotoponlineplay.technology
tm88z.com
navnoorkang.com
lazydogkennels.net
yisilv.com
usasubels.com
desperatehouse-lives.com
brianbertini.info
sag4bd.com
zahnarzt-rosenheim.info
newspies.com
thefinalexpensegroup.com
wwwjinsha784.com
128hao.com
abesdjc.com
majportfolio.com
travelfoodmustafa.com
indo-mart.com
funlick.net
howstevedidthat.com
katspropertymanagement.com
hzsonata.com
believers.expert
littleapple-vo.com
jmdyljuf.win
exerzonegymgt.com
huichengsl.com
keithdeanjr.com
ybntest699.com
allmandbros.com
maftfw.com
online-attestation.com
fmbzzpx.download
staramway.com
mugzshideout.net
12usy.com
immuno-naturo.com
tractoferguson.com
rjconstrucoesse.com
johnscharrett.business
1517toparis.movie
redpingwinful.net
o31y7g.download
greenwebapps.com
6pinbahis.com
shouyou168.com
globalvalueshopping.com
lfhyblm.com
maisbrasilpublicidade.com
alixzwane.com
pubwild.com
govaj.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4964-3-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2520 set thread context of 4964 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 4964 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 4964 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2520 wrote to memory of 4472 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 84 PID 2520 wrote to memory of 4472 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 84 PID 2520 wrote to memory of 4472 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 84 PID 2520 wrote to memory of 4964 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 85 PID 2520 wrote to memory of 4964 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 85 PID 2520 wrote to memory of 4964 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 85 PID 2520 wrote to memory of 4964 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 85 PID 2520 wrote to memory of 4964 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 85 PID 2520 wrote to memory of 4964 2520 e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe"{path}"2⤵PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\e3d2bd1833ff6c9e89f73ee2b79b2342_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-