Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
b76f4ae037afdd47c770ca419707da70
-
SHA1
2992ae46bbbe2e9066b822ebf3f6034bfd8265d5
-
SHA256
234ae96ea3cdc7c5fda7043edab91f0c0f6a69cbb92b32ab35ef7495349caf88
-
SHA512
8d435c5051f97a8c850ac5615248aad35321859ce81ccea0c994d0190faa066c700ba7fa171002ee8ee3d44a4aca43bcbf342812ea21a61d47af05b9ace77601
-
SSDEEP
24576:n3OlcorrMzRvkk9HfhFnDOoLc4KDbm+DVBAB:o5n8Rvkk/OG
Malware Config
Extracted
formbook
3.8
ca
achieveit.online
regionalarabicfood.com
clonepercent.win
xn--chq49lg87a.com
ulaler.net
advenc.tech
thebusinessbutlersllc.com
powrchanics.com
itboysf.com
djianwalker.com
sungatheart.com
hometoolstoys.com
nday.ltd
cimode.net
hengzhi.win
hongchengrubber.com
yoursafetraffic4update.win
yourexpert.info
5izhenbaoge.com
zekala.com
tbyy120.com
internationalbudoryuacademy.com
xn--sssw6jcwotf.com
smarterproductsourcing.com
alukaspowercable.com
xflg6.com
996d88.com
silatv.info
epicsnacksandshacks.com
midatlanticsummersale.com
transslator.com
leafministry.com
x-powermusic.com
tripit.info
virtualtrailhead.net
xiaodaiban.com
selcoapp.com
uni-jeans.com
entreprenwars.com
shicai88.com
ivysaur.life
kktc.kim
ctbnkonline.com
directloanguard.online
hamptonbrandon.info
daa.ink
menumeneeren.com
satkingarrowplay.com
helpfile.men
dhackhi.com
topsecretmedicines.com
irmonich.com
greenbazar24.com
vonderleirerkennels.net
pizzapurists.com
mikewalden.net
bjairport.net
reset-rt.com
a796lse-jkj.com
news3038.cool
5dolari.online
hcklp.com
buckhornhfs.com
vawe.ltd
daylleosin.info
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2652-0-0x0000000000406000-0x0000000000433000-memory.dmp formbook behavioral1/memory/2652-1-0x0000000000400000-0x000000000052F000-memory.dmp formbook -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3068 2652 WerFault.exe b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exepid process 2652 b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exedescription pid process target process PID 2652 wrote to memory of 3068 2652 b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exe WerFault.exe PID 2652 wrote to memory of 3068 2652 b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exe WerFault.exe PID 2652 wrote to memory of 3068 2652 b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exe WerFault.exe PID 2652 wrote to memory of 3068 2652 b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b76f4ae037afdd47c770ca419707da70_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 1762⤵
- Program crash