Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe
-
Size
816KB
-
MD5
084d9c372d05fc7450a7acc2d730e40a
-
SHA1
e87fbc8d77a456d97cd0c7d8a1f69752f2ef50b0
-
SHA256
f12df428fa830292897aabb6f73c5ecf96e855e278c3320e21e45629c84bf9ef
-
SHA512
c3655b286f886b5665ec0dffcea84687046170b72add2a23f287ea8fd3df5cd7daeb402ab5d9af25b163bc454bfa0c30e7f39d2cbfa1dbc385b7575ff92e6dfb
-
SSDEEP
12288:AlNwTyzx+jxivZgVm2WCD1QbwBaYCQJVHmlZ:AlNwWN+jwZSm2ZivqJVHyZ
Malware Config
Extracted
formbook
4.1
dyt
tg0913.com
fhehsjeh.com
hoslergroup.com
bradfordsahm.com
dopefuse.com
4vrlwi.site
greyboxautomations.com
codedlock.com
manifester.guru
luckyvertical.com
marvitrans.net
blushinglips.wine
shreeshyamexporters.com
bkdn.xyz
susanenglert.net
caprichodigital20.com
reianswers.net
alejandrobrand.com
drsineadbeirne.com
dijitak.com
naturally-toned.com
designed4youevents.com
socksofcolors.com
dongzhenwl.com
pinkopalboutique.com
sptrading.company
innocentandnaive.com
zhongwu.tech
evokealpha.com
humanitera.international
so0551.com
eacvea.com
plus1joinersandbuilders.com
coolartgallery.com
theholinesshousewife.com
admoney.info
bakldx.com
contenttoincome.com
royalpetcanvas.com
mosella.online
surkentkuruyemis.com
nomadroams.com
cezede.com
spleafpro.com
thepreventivemedicine.net
quatormi.site
norsk-medisin.com
connecting4fun.com
enecaa.com
keller-bec.com
sensvia25.com
summerlively.com
eseskalierteh.com
longwoodlife.com
lesavonbyannvictoria.com
fessucesesee.com
sportscircleindy.com
sulukozukremi.com
ajreality.com
scattershotgames.com
mediclyft.com
casinobigbank.com
jasminesecretshop.com
njcfpnetwork.com
guanmei2020.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1880-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1880-24-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Executes dropped EXE 1 IoCs
Processes:
AddInProcess32.exepid process 1880 AddInProcess32.exe -
Loads dropped DLL 1 IoCs
Processes:
084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exepid process 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/2376-3-0x0000000000D30000-0x0000000000D58000-memory.dmp agile_net -
Suspicious use of SetThreadContext 3 IoCs
Processes:
084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exeAddInProcess32.exewlanext.exedescription pid process target process PID 2376 set thread context of 1880 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe AddInProcess32.exe PID 1880 set thread context of 1184 1880 AddInProcess32.exe Explorer.EXE PID 2652 set thread context of 1184 2652 wlanext.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exeAddInProcess32.exewlanext.exepid process 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe 1880 AddInProcess32.exe 1880 AddInProcess32.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe 2652 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
AddInProcess32.exewlanext.exepid process 1880 AddInProcess32.exe 1880 AddInProcess32.exe 1880 AddInProcess32.exe 2652 wlanext.exe 2652 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exeAddInProcess32.exewlanext.exedescription pid process Token: SeDebugPrivilege 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe Token: SeDebugPrivilege 1880 AddInProcess32.exe Token: SeDebugPrivilege 2652 wlanext.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exeExplorer.EXEwlanext.exedescription pid process target process PID 2376 wrote to memory of 1880 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe AddInProcess32.exe PID 2376 wrote to memory of 1880 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe AddInProcess32.exe PID 2376 wrote to memory of 1880 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe AddInProcess32.exe PID 2376 wrote to memory of 1880 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe AddInProcess32.exe PID 2376 wrote to memory of 1880 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe AddInProcess32.exe PID 2376 wrote to memory of 1880 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe AddInProcess32.exe PID 2376 wrote to memory of 1880 2376 084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe AddInProcess32.exe PID 1184 wrote to memory of 2652 1184 Explorer.EXE wlanext.exe PID 1184 wrote to memory of 2652 1184 Explorer.EXE wlanext.exe PID 1184 wrote to memory of 2652 1184 Explorer.EXE wlanext.exe PID 1184 wrote to memory of 2652 1184 Explorer.EXE wlanext.exe PID 2652 wrote to memory of 2496 2652 wlanext.exe cmd.exe PID 2652 wrote to memory of 2496 2652 wlanext.exe cmd.exe PID 2652 wrote to memory of 2496 2652 wlanext.exe cmd.exe PID 2652 wrote to memory of 2496 2652 wlanext.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\084d9c372d05fc7450a7acc2d730e40a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\AddInProcess32.exeFilesize
41KB
MD56a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
memory/1184-33-0x0000000004BD0000-0x0000000004CB6000-memory.dmpFilesize
920KB
-
memory/1184-23-0x0000000000200000-0x0000000000300000-memory.dmpFilesize
1024KB
-
memory/1184-26-0x0000000004BD0000-0x0000000004CB6000-memory.dmpFilesize
920KB
-
memory/1880-15-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1880-14-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1880-24-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1880-25-0x0000000000430000-0x0000000000444000-memory.dmpFilesize
80KB
-
memory/1880-21-0x0000000000700000-0x0000000000A03000-memory.dmpFilesize
3.0MB
-
memory/1880-18-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1880-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2376-10-0x0000000000D20000-0x0000000000D26000-memory.dmpFilesize
24KB
-
memory/2376-0-0x00000000741FE000-0x00000000741FF000-memory.dmpFilesize
4KB
-
memory/2376-4-0x00000000741F0000-0x00000000748DE000-memory.dmpFilesize
6.9MB
-
memory/2376-5-0x00000000741FE000-0x00000000741FF000-memory.dmpFilesize
4KB
-
memory/2376-20-0x00000000741F0000-0x00000000748DE000-memory.dmpFilesize
6.9MB
-
memory/2376-9-0x0000000000D00000-0x0000000000D14000-memory.dmpFilesize
80KB
-
memory/2376-3-0x0000000000D30000-0x0000000000D58000-memory.dmpFilesize
160KB
-
memory/2376-2-0x00000000741F0000-0x00000000748DE000-memory.dmpFilesize
6.9MB
-
memory/2376-7-0x00000000741F0000-0x00000000748DE000-memory.dmpFilesize
6.9MB
-
memory/2376-6-0x00000000741F0000-0x00000000748DE000-memory.dmpFilesize
6.9MB
-
memory/2376-1-0x00000000011B0000-0x0000000001282000-memory.dmpFilesize
840KB
-
memory/2652-29-0x0000000000650000-0x0000000000666000-memory.dmpFilesize
88KB
-
memory/2652-27-0x0000000000650000-0x0000000000666000-memory.dmpFilesize
88KB