Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 14:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe
-
Size
929KB
-
MD5
5169a66e103b9ae847af49ecf8efb193
-
SHA1
44e891e64c62e6109f2b33c15a077b5c35214a1b
-
SHA256
b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491
-
SHA512
b628c682ce36a196f085d972043343ef164c680a0baa1198ff88f5c38010e25c79466d76698caa5238ab307d0fed45938f6a851ecf1320d562326032179bbfa3
-
SSDEEP
24576:asyK6fzapeIn3KUWcNz5HCgni/16cCDmg3:asyK6fzape86UtRCQi/16f
Malware Config
Extracted
formbook
4.1
g9s4
visitmechanic.com
xn--kck4a7gpd474vx6i.com
prozdorovie.online
omatpupa.xyz
zamokwakhekhumalo.com
mayuraandchris.com
wanasahstore.com
bicicletas.win
yhdm61.com
mortgageattract.com
centuryofbio.com
xtdkgjt.com
nhahangnetnghe.com
whatsappsemcontato.com
onlinemarketing-teamwebus.com
zuevu.com
dancaronmusic.com
tingseo.com
uniflapline.com
setuppharmaweb.online
tunerdiesel.com
jetfreqs.com
magnusempire.com
lxmetal.ltd
ldexhibit.com
takainna.com
vaocation.com
jk0078.com
youniversoulconsciousness.com
healthcarehaven.com
sorecly.online
prosale.xyz
klevr.tech
kaderarslan.com
selmagreen.com
peoplesbank.xyz
codekaro.com
7882.direct
vglyph.com
uznalimoskwa.xyz
valeriemariotte.com
m2review.com
roamkyoto.com
shilohscentral.com
helmpartner.com
beindaily.com
hvacbodles.com
lacky-traveler.com
agccapitalsolutions.com
tussuncivky.xyz
incorp18.com
northernfernlifestyle.com
thought-full-ness.com
riobetcasino-qi.xyz
cloud-scanifly.com
scheveningenbnb.site
asphaltlake.biz
hanleydevelopments.com
indosloter88.net
keyuchen.site
infoborges.tech
dampits.biz
suicideuas.com
cabinnap.com
tibetcnm.info
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2724-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2724-15-0x0000000000C50000-0x0000000000F53000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2340 set thread context of 2724 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 2724 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2960 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 31 PID 2340 wrote to memory of 2960 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 31 PID 2340 wrote to memory of 2960 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 31 PID 2340 wrote to memory of 2960 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 31 PID 2340 wrote to memory of 2724 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 32 PID 2340 wrote to memory of 2724 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 32 PID 2340 wrote to memory of 2724 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 32 PID 2340 wrote to memory of 2724 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 32 PID 2340 wrote to memory of 2724 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 32 PID 2340 wrote to memory of 2724 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 32 PID 2340 wrote to memory of 2724 2340 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe"2⤵PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-