Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 14:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe
-
Size
929KB
-
MD5
5169a66e103b9ae847af49ecf8efb193
-
SHA1
44e891e64c62e6109f2b33c15a077b5c35214a1b
-
SHA256
b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491
-
SHA512
b628c682ce36a196f085d972043343ef164c680a0baa1198ff88f5c38010e25c79466d76698caa5238ab307d0fed45938f6a851ecf1320d562326032179bbfa3
-
SSDEEP
24576:asyK6fzapeIn3KUWcNz5HCgni/16cCDmg3:asyK6fzape86UtRCQi/16f
Malware Config
Extracted
formbook
4.1
g9s4
visitmechanic.com
xn--kck4a7gpd474vx6i.com
prozdorovie.online
omatpupa.xyz
zamokwakhekhumalo.com
mayuraandchris.com
wanasahstore.com
bicicletas.win
yhdm61.com
mortgageattract.com
centuryofbio.com
xtdkgjt.com
nhahangnetnghe.com
whatsappsemcontato.com
onlinemarketing-teamwebus.com
zuevu.com
dancaronmusic.com
tingseo.com
uniflapline.com
setuppharmaweb.online
tunerdiesel.com
jetfreqs.com
magnusempire.com
lxmetal.ltd
ldexhibit.com
takainna.com
vaocation.com
jk0078.com
youniversoulconsciousness.com
healthcarehaven.com
sorecly.online
prosale.xyz
klevr.tech
kaderarslan.com
selmagreen.com
peoplesbank.xyz
codekaro.com
7882.direct
vglyph.com
uznalimoskwa.xyz
valeriemariotte.com
m2review.com
roamkyoto.com
shilohscentral.com
helmpartner.com
beindaily.com
hvacbodles.com
lacky-traveler.com
agccapitalsolutions.com
tussuncivky.xyz
incorp18.com
northernfernlifestyle.com
thought-full-ness.com
riobetcasino-qi.xyz
cloud-scanifly.com
scheveningenbnb.site
asphaltlake.biz
hanleydevelopments.com
indosloter88.net
keyuchen.site
infoborges.tech
dampits.biz
suicideuas.com
cabinnap.com
tibetcnm.info
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3940-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1596 set thread context of 3940 1596 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3940 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 3940 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1596 wrote to memory of 3940 1596 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 99 PID 1596 wrote to memory of 3940 1596 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 99 PID 1596 wrote to memory of 3940 1596 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 99 PID 1596 wrote to memory of 3940 1596 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 99 PID 1596 wrote to memory of 3940 1596 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 99 PID 1596 wrote to memory of 3940 1596 JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1c436a46f8d07d3624ddff94346d38ff0349fd55c9eef4be0185a61b840b491.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-