Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 20:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe
-
Size
415KB
-
MD5
bc953f7124b6516cd04745d9cc61ebd3
-
SHA1
ad0d175d506fdbee2009bcdbb7bfb4fe69845a1b
-
SHA256
ff8236a838496d7e7ae1363fd45db6207023f6d8fc26a7ddaf2f1f4f40d2397c
-
SHA512
72ac670af019bec185c4e6dfef1aed408e6ee55afcb4d07b50713ff608e0809bb6555caee8ddc5c924afaa7ba1fe8462ce333518aa0a00dbff2a5cae563495c3
-
SSDEEP
12288:41ysw08Vj3I2mzOC1BkPeriPswLfBCCMqP+:41I0baIB32kwLoqm
Malware Config
Extracted
formbook
4.1
h0gd
hispansud.com
sanslisin156.com
izmediajo.com
fukugyo-kuchicomi.net
zjzmkj.net
powerupinnovations.com
unigradecuracao.net
inspirasimagz.com
isaacnqwilliams.store
john316graphics.net
wcparadise.net
trejoblanco.com
100x100cultura.com
beedivinehomedecor.com
polant.xyz
ascrete.com
www23855.com
emmagx.com
rekotalent.biz
fersamultiservicios.com
omaniaa.net
olusiune.xyz
shtycatur.store
private-cars.net
madduxworks.com
edhl-sa.net
vivendodesorteios.online
hec-outfits.com
onlinepoojabooking.com
sofievermeulen.com
recargas-online-virtual.online
all-wedding.com
perfectbikeshort.com
travimall.com
kxctut2.xyz
somaijobs.net
thecyber.academy
official-yukitakaoka.com
winkletest.com
anlegerschutz.review
812664.com
uniqe-base.com
roofingcompanywarren.com
thbzjs.com
tracktelevision.com
rckt-api.com
therealmccoypdfcoffee.com
dalehollowoutdoors.com
childcaregameplan.com
starbonus7.com
mturko.com
genelyn.net
swapit.press
bathroomremodelingtips.net
v60010.xyz
propertyprotect.net
dealipal.com
savefrsaom.net
sepela-food.com
thepetvetlife.com
el-balcon.com
frenda.online
sutefisufeles.xyz
trillumtrillum.com
x-surcinetenerife.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2756-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2756-17-0x0000000000BA0000-0x0000000000EA3000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1060 set thread context of 2756 1060 JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2756 JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2756 1060 JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe 31 PID 1060 wrote to memory of 2756 1060 JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe 31 PID 1060 wrote to memory of 2756 1060 JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe 31 PID 1060 wrote to memory of 2756 1060 JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe 31 PID 1060 wrote to memory of 2756 1060 JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe 31 PID 1060 wrote to memory of 2756 1060 JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe 31 PID 1060 wrote to memory of 2756 1060 JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc953f7124b6516cd04745d9cc61ebd3.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-