Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe
-
Size
420KB
-
MD5
b7189c8229baecede904e58eff8438c7
-
SHA1
e3637bd5028b35dddd27fc1f836076cd4ba3eb61
-
SHA256
a47718c57ed25e5c30f0ea7c68952d6aae4ec1f4f0e889d7edae01228334cd14
-
SHA512
15587ae65ac51b87ada349b2a4acd8333ac61687cfda1de9846630a3123154a7621398b1d8bbeff511e19b4c0d9b3180010059383c61bf0109388585cdc824f5
-
SSDEEP
12288:q6/vbcscYE/kaI6mdVHq+dTQT/cHcFZcmD:qGArYEMaI6mdVHRycHgcm
Malware Config
Extracted
formbook
3.9
be
funtimejacksonms.com
vivrepourlamode.com
leonisviridis.com
this-hiking-cycling.com
quintavenidagym.com
bigfishsurfboards.net
visitbeiliu.com
mobileappsdirectnow.com
globusholdings.com
panopolisclub.com
qrw.info
presize.net
flsjapan2012.com
englishpremiershipcamps.com
studiolgm.com
fernandomellovianna.net
villa-le-boqueteau.com
souqmore.com
trapcessful.com
jumpshoppu.com
allnaturalcbdscharlotte.com
13237171111.com
stevejobs.ink
xhtd646.com
2mbrracp6t.com
vggfe.info
sadamag.com
mr687.com
jsgo.info
zgagi.com
trusteedelivery.com
bdsbank.online
lands.party
cac-apudep.com
pzlece.info
integralcoderz.com
yanhyh.com
probynsschool.net
greenlifegardens.net
asores.com
theweddinggrove.com
jeannineandwilliam.com
tv17482.info
grandrivermutual.com
casainsardegna.info
verytimelybroth.com
smartchoicecarecentral.com
h0is0fs00p.com
thewordbistro.net
caobi988.com
youbiti.com
customprintinghub.com
thelillestate.com
shengquandianqi.com
ptuyp.info
nyechrysler.com
rainforesthikes.com
amywoodrick.com
sdxunke.com
4008850400.com
homelytreat.com
oegdwclafshoaliest.review
freebitcoin.sale
littlephoenixespublishing.com
prokbya.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4744-13-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/3148-10-0x00000000034A0000-0x00000000034AA000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b7189c8229baecede904e58eff8438c7_JaffaCakes118.exedescription pid process target process PID 3148 set thread context of 4744 3148 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
b7189c8229baecede904e58eff8438c7_JaffaCakes118.exepid process 4744 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe 4744 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe 4744 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b7189c8229baecede904e58eff8438c7_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 3148 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe Token: 33 3148 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3148 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b7189c8229baecede904e58eff8438c7_JaffaCakes118.exedescription pid process target process PID 3148 wrote to memory of 4744 3148 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe PID 3148 wrote to memory of 4744 3148 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe PID 3148 wrote to memory of 4744 3148 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe PID 3148 wrote to memory of 4744 3148 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe PID 3148 wrote to memory of 4744 3148 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe PID 3148 wrote to memory of 4744 3148 b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7189c8229baecede904e58eff8438c7_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4328 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3148-8-0x0000000007F70000-0x0000000007F78000-memory.dmpFilesize
32KB
-
memory/3148-6-0x0000000007FB0000-0x0000000008042000-memory.dmpFilesize
584KB
-
memory/3148-2-0x0000000005930000-0x0000000005968000-memory.dmpFilesize
224KB
-
memory/3148-3-0x0000000074DD0000-0x0000000075580000-memory.dmpFilesize
7.7MB
-
memory/3148-0-0x0000000074DDE000-0x0000000074DDF000-memory.dmpFilesize
4KB
-
memory/3148-5-0x0000000008450000-0x00000000089F4000-memory.dmpFilesize
5.6MB
-
memory/3148-1-0x0000000000FB0000-0x0000000001022000-memory.dmpFilesize
456KB
-
memory/3148-7-0x0000000007F20000-0x0000000007F2E000-memory.dmpFilesize
56KB
-
memory/3148-4-0x0000000007E70000-0x0000000007EA0000-memory.dmpFilesize
192KB
-
memory/3148-9-0x0000000074DDE000-0x0000000074DDF000-memory.dmpFilesize
4KB
-
memory/3148-10-0x00000000034A0000-0x00000000034AA000-memory.dmpFilesize
40KB
-
memory/3148-11-0x0000000008B00000-0x0000000008B9C000-memory.dmpFilesize
624KB
-
memory/3148-12-0x0000000074DD0000-0x0000000075580000-memory.dmpFilesize
7.7MB
-
memory/3148-15-0x0000000074DD0000-0x0000000075580000-memory.dmpFilesize
7.7MB
-
memory/4744-13-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4744-16-0x0000000001270000-0x00000000015BA000-memory.dmpFilesize
3.3MB