Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 10:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe
-
Size
1.1MB
-
MD5
fb009fdbd8542d823c4cc9fb02ecc6dc
-
SHA1
76837f628081a7e7f620de9d44c92ead052efe46
-
SHA256
527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1
-
SHA512
637e8a164ca98b0d5187030ce6eebdd2297efbe8ac4dcf2aaa27f003fae23778c8f3547b4bea4504ec7660de00cbe818f96bcddc56dd7c281af1b9bf97707e4c
-
SSDEEP
24576:QxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNussxvfCBBVa:5vfovu8yBthQoJFdj
Malware Config
Extracted
formbook
xoqd
H5Xrxamh0f+N/tax
kD7yxmoTHSewkFqlnqV14wuw
RLsWzULVoCMc+A==
SOzPYHAMr8HKhU4b3XZSPb+gnUc=
Li195vujSFxYOpMGx2n2
kH4rLttwbW703GwH2z4=
uWRYsosnwsGcigoCt4ePgDDQZzr3d9ST
OrIL0WgG9VNBHvP2lkE1vnt0oE0=
NG2ALNd/l8Mw4WwH2z4=
VgnfELdrcdvMsD0uz3t3gBWUyas7gw==
DxNwymeJ/lPRqndL+WzAVUy4
mYxRaXV1X6WuqB4Op2d5MgrgIg==
8Um50qpVPodey2OVew==
irKA6NyNP0oxy2OVew==
KVo8zsszovt9JkmEbxfAVUy4
ZrSnCLtRSTV9Ujx9LigBEFq+
ty/Fn16LA2isSw5fYg==
MLFtv3Tmp+zu0Rr3nEhJLnt0oE0=
qTDnPBatWH9CF5jPvmhnVr+gnUc=
SXhRqlXv6M8V8d0hJ/93b/g=
zA0JiHcj8iMky2OVew==
cG4AlURs6uHMshcFoWl5MgrgIg==
MgTotpKOipMfAHNYtrSRWw==
0kQKUyjRksynhmqnWP93b/g=
Q3RO3ueRSFxWUL32vzkN/391gqo6gQ==
nsyhEeGp6g9+GTVvGgr5
hzgqr7iNa46KhPrlfjtJP8hKSaKvof0=
5p2U/rs35xUcBowLvjQ=
KjCuE6zYWk9vy2OVew==
/mzGnJm07yeTQx1yRQtqPeE=
b14GzHltitLojlk=
ObgiMe5hGTMy773GPxj/
aeRVNNR2gdLojlk=
tLlvQSpkrclSPBN0cBjAVUy4
VFW0G7XhVKVV/vO7
NXRQqnDve05Es7iTbA==
rz6vuqhU1z0sCsX/qVDL3Sfk54lniw==
YD+T7Zl8N5kI
TnosjPZn7uHsVV427amIWQ==
NlIBymMJ6ycqy2OVew==
hhBsXnOVyvVvWE2vlmxzbQeWyas7gw==
/3MdZRaZVpBiy2OVew==
Zbx1F58WoCMc+A==
W2C1ICOSBmfHpmh9NhH9
oF2zbPOTWtLojlk=
HmhixGzbdnVJMKqZ7+7asi809UAJwPU=
241xwZk14xr218MAixmxHlYtyas7gw==
0BPxbW4gx8yqivbitUoUf2yeZjr3d9ST
PT702p62HWDAo9SQoVT6
sVfk8r6Uw78+KxtrPMyVkFQVSIsR
tJZFFPoxieJULWxdtrSRWw==
3Rz6eYAOQYBK9w==
+56G+LUb1a30zskhwqOXTA==
r7AavTTQoCMc+A==
w5h4foux5RaZiH/buTL69oggL6Kvof0=
62UNajje2D85KBFOCevfsXE9ZJYb
7GQbayvRz9Ml12wH2z4=
t1S9j3mWy9Y2s7iTbA==
BYHj6tOOLYPdt7bGPxj/
ofDXNfuZhG23ZjqHcxzAVUy4
vTizr4g4/iH4o+1BGp0eJ64rRgDFcc6F
JJb0xHeqq7Q=
sPvxjaZQDzQW+GFP97ygMgrgIg==
tKX1WGoToCMc+A==
tbwtaobao.org
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 2912 2044 JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2912 JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2912 2044 JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe 31 PID 2044 wrote to memory of 2912 2044 JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe 31 PID 2044 wrote to memory of 2912 2044 JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe 31 PID 2044 wrote to memory of 2912 2044 JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe 31 PID 2044 wrote to memory of 2912 2044 JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe 31 PID 2044 wrote to memory of 2912 2044 JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe 31 PID 2044 wrote to memory of 2912 2044 JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-