Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 13:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe
-
Size
482KB
-
MD5
664920ea617d6c5f15c228b7374aa15f
-
SHA1
3cdf04f5f2d732f0a199151ff35af27a4cce12aa
-
SHA256
65acd8c73c518c97a1539bc8e3f62fb8f06431d7030c6cc1463c855aec0ec46f
-
SHA512
ba40b25f6f45b32001929a7da37b512a8d642e0b45ca19ff0dc2edadf82982b84f8b9a51c9781c30226ec6c05cb12bb50ef252f227cf8d790d390a26400c5462
-
SSDEEP
6144:mhdtBhm+BNEW6Uqd2GhNwv/uCaIhInekTtAnVk3RfMofArTufGjK0V:4dPhuzUi2iNwnu6InekGnVk3jIT
Malware Config
Extracted
formbook
4.1
s18y
jokes-online.com
dzzdjn.com
lizzieerhardtebnaryepptts.com
interfacehand.xyz
sale-m.site
block-facebook.com
dicasdamadrinha.com
maythewind.com
hasari.net
omnists.com
thevalley-eg.com
rdfj.xyz
szhfcy.com
alkalineage.club
fdf.xyz
absorplus.com
poldolongo.com
badassshirts.club
ferienwohnungenmv.com
bilboondokoak.com
ambrosiaaudio.com
lifeneurologyclub.com
femboys.world
blehmails.com
gametimebg.com
duytienauto.net
owerful.com
amedicalsupplyco.com
americonnlogistics.com
ateamautoglassga.com
clickstool.com
fzdzcnj.com
txtgo.xyz
izassist.com
3bangzhu.com
myesstyle.com
aek181129aek.xyz
daoxinghumaotest.com
jxdg.xyz
restorationculturecon.com
thenaturalnutrient.com
sportsandgames.info
spiderwebinar.net
erqgseidx.com
donutmastermind.com
aidatislemleri-govtr.com
weetsist.com
sunsetschoolportaits.com
exodusguarant.tech
gsnbls.top
huangdashi33.xyz
amazonretoure.net
greathomeinlakewood.com
lenovoidc.com
qiuhenglawfirm.com
surveyorslimited.com
carterscts.com
helmosy.online
bakersfieldlaughingstock.com
as-payjrku.icu
mr-exclusive.com
givepy.info
ifvita.com
obesocarpinteria.online
agentpathleurre.space
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3040-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4152 set thread context of 3040 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 3040 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 3040 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4152 wrote to memory of 5104 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 99 PID 4152 wrote to memory of 5104 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 99 PID 4152 wrote to memory of 5104 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 99 PID 4152 wrote to memory of 4732 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 100 PID 4152 wrote to memory of 4732 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 100 PID 4152 wrote to memory of 4732 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 100 PID 4152 wrote to memory of 2648 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 101 PID 4152 wrote to memory of 2648 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 101 PID 4152 wrote to memory of 2648 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 101 PID 4152 wrote to memory of 3040 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 102 PID 4152 wrote to memory of 3040 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 102 PID 4152 wrote to memory of 3040 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 102 PID 4152 wrote to memory of 3040 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 102 PID 4152 wrote to memory of 3040 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 102 PID 4152 wrote to memory of 3040 4152 JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe"2⤵PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe"2⤵PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe"2⤵PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_664920ea617d6c5f15c228b7374aa15f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-