Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe
-
Size
627KB
-
MD5
0f00d594ae90f555e1f54e4dc3b22c8c
-
SHA1
ff6849f00b71fa53daff0301c924da576168d30e
-
SHA256
dad11fdf5a3a11a994aef087a1ef80ca70e951a986ae89839d51c28678add492
-
SHA512
011a71c37ba2eeeca4e6dde640a95f3875d82f4bac9baad13f76770fa1693f68c42710aa2c37c5036d319d112eb143098e8f5c7a5dbb8576a1c6410868fb2f22
-
SSDEEP
12288:0J2hwy8lB6yr2804FNz1F1gjHxFonkDvr2CdKZ8rjFYeM:A2hW6yPt1PgjPonkDvr2zZ8rjE
Malware Config
Extracted
formbook
4.1
whn
braidwooduk.com
dryneedlingmia.com
sacburgermonth.com
jacekkurek.com
satovic-medical-labo.com
fessuseqaredsee.com
lnxjy.com
virtualstudiosapp.com
thepreparatoryphysio.com
maxidef.com
hdlivesonlinetv24.com
caringedgedhr.net
battlepaches.com
incredihouses.com
breadslicerblade.com
earthscience.club
soar.supply
alogralpca.info
pagucchan.info
digitacard.com
xn--9t4b11d99a4r.com
sublimebeautypalace.com
jadeetching.com
kurokawa-bebida.com
nancet.com
mandevilleconsultant.online
niaford.com
design8beyond.com
mithrasaree.com
queenzjewelz.com
entrepreneurshipmindset.com
santalbysercio.com
patxipiruli.com
golden-harmony.com
gideonbleak.com
ntytqx.com
happyspaceproperties.com
eewin-vip.com
frontpagearticles.com
fine1002.academy
derechoconsumidores.com
shopdollyparton.com
275215.com
leiyinkl.com
yeasuc.com
historydaze.com
opennetwifi.online
alakhbaralalamianews.com
nqh1.com
xrpripple.fund
securehuntington.info
thetoolbx.com
sparklfencing.com
soberrhode.net
slingshotfun.com
staceybartels.com
glencoreinternal.net
pdfshelf.club
rsdpinfotech.com
acehsports.com
brakemans.repair
walkingartbyduane.com
orsayfootball.com
qqcaotv.com
surdicbeard.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2960-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exedescription pid process target process PID 1732 set thread context of 2960 1732 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exepid process 2960 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exedescription pid process target process PID 1732 wrote to memory of 2960 1732 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe PID 1732 wrote to memory of 2960 1732 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe PID 1732 wrote to memory of 2960 1732 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe PID 1732 wrote to memory of 2960 1732 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe PID 1732 wrote to memory of 2960 1732 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe PID 1732 wrote to memory of 2960 1732 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe PID 1732 wrote to memory of 2960 1732 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe 0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f00d594ae90f555e1f54e4dc3b22c8c_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1732-0-0x0000000074CC1000-0x0000000074CC2000-memory.dmpFilesize
4KB
-
memory/1732-1-0x0000000074CC0000-0x000000007526B000-memory.dmpFilesize
5.7MB
-
memory/1732-2-0x0000000074CC0000-0x000000007526B000-memory.dmpFilesize
5.7MB
-
memory/1732-3-0x0000000074CC0000-0x000000007526B000-memory.dmpFilesize
5.7MB
-
memory/1732-4-0x0000000074CC0000-0x000000007526B000-memory.dmpFilesize
5.7MB
-
memory/1732-12-0x0000000074CC0000-0x000000007526B000-memory.dmpFilesize
5.7MB
-
memory/2960-5-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2960-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2960-11-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2960-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2960-13-0x0000000000990000-0x0000000000C93000-memory.dmpFilesize
3.0MB