Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe
-
Size
827KB
-
MD5
50acc1248ad3341ec520b1940a700f07
-
SHA1
eb3171494d49c0dc2b982342f85421ef7d7279bb
-
SHA256
3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb
-
SHA512
e4f666e658666bdaa747f17e162041885f5809c774fd0c683d10baff8b8c5896ef943f7579fad7677341d195d07b05d9eeec7b6d742fee935e2f497a7054a9aa
-
SSDEEP
12288:nr9TkqZuTuI4n7H/eJLGAARvsjS3ErSRuLW1VmKKCMOF9SaLukyc/+XciekEA3Kz:bKGvlsQEWYCHmKKhm93vycfGG
Malware Config
Extracted
formbook
4.1
bt33
mbaonlinefreedegress.info
myforevermaid.com
daoyi365.com
weientm.com
legal-mx.com
formationrigging.com
heidiet.xyz
school-prosto.store
healthvitaminnutrition.com
digitalsolutionusa.com
little-bazar.com
jnbeautycanada.com
optoelek.com
learntoairmail.com
hawkminer.com
kingofearth.love
ktnstay.xyz
zouxin.love
mainlandpr.com
mamm-hummel.com
planosdwgcad.com
dlscordapp.info
northfacecore.online
professionalswhotrade.com
vbcgrp.com
spares245.com
alphasignsatl.online
342731.com
amazingarizonaproperty.com
priorlakecarpetcleaning.com
boardwalksnj.com
shiinebydesign.com
dymends.digital
indie-shopper.com
weihiw.quest
dchehe.com
momshousegeorgia.com
bnvxnohpcuhxbcueuvl.biz
tinyspout.com
hambransupply.com
keywordjord.com
koebnertriangle.com
aodiskoo.com
zgqyjlhw.com
thule-usa.store
western-overseas.online
woofpack-adventures.com
tilallarehome.com
51easyprint.com
arucad.university
llanoseeds.com
3-v0.space
harsors.com
sumiyoshiku-tenisuhiji.xyz
alsafqah.com
wrxworld.net
evrefill.com
multicoopltda.com
ziggytherealtor.com
candidatbellomansour.info
bigpromo.club
evagrombook.com
lyni7lyo.xyz
ways.express
karasevda-jor.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4736-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4080 set thread context of 4736 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 4736 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 4736 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4436 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 91 PID 4080 wrote to memory of 4436 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 91 PID 4080 wrote to memory of 4436 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 91 PID 4080 wrote to memory of 4736 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 92 PID 4080 wrote to memory of 4736 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 92 PID 4080 wrote to memory of 4736 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 92 PID 4080 wrote to memory of 4736 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 92 PID 4080 wrote to memory of 4736 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 92 PID 4080 wrote to memory of 4736 4080 JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe"2⤵PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3437d0b089789824090fe75c6a7f9bd4ee86cd749aec304a3ab3a409f3feecbb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-