Analysis
-
max time kernel
100s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
14073747c219f890f793300d883dc11e_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
14073747c219f890f793300d883dc11e_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
14073747c219f890f793300d883dc11e
-
SHA1
3f856d534481a0e21fd5ad78b6e704f43bb95429
-
SHA256
10e6fe685ba524be5fc4bd0b868e72fd113b9529f8e3428d6c7736aeffe1ee02
-
SHA512
f713b319b94c45182131ea5b27f7d1423468b95ee5f5616ee27f1ff253a9a2aef6e9ed47fec1416018dfaa6f74cd03f34022d09c4c4f985e839eded6f4ff4c90
-
SSDEEP
24576:qy7Dbx6R8hJ4XF9zK9j+AM4SaDAVxXEEZ4UJKW1mYLFeCXDMDYOg7:lDxyF9Ca9Z4UJKW1mYLFeCXDMDYOg
Malware Config
Extracted
formbook
4.1
gbr
serabet.com
galanggroup.com
zweitmeinung-urologie.com
damsalon.com
binliwine.com
lifeladderindia.com
flyingwranchmanagement.com
tripsandturns.com
3headdesign.com
aluminumfacade.com
toprestau.com
facetreatspa.com
periodrescuekit.com
dbaojian.com
altinotokurtarma.com
gkpelle.com
loguslife.com
treatse.com
lghglzcnkx.net
jawharabh.com
planterboxgardener.com
douyzqdsgl.com
bestofselling.com
carbeloy.com
haok.net
mymailtek.com
itsabossthing.com
peoplesdao.com
bhumarealestate.com
otugxixd.icu
amongugadu.com
jemadrekre.com
nikber.com
genomicsmaster.com
firstbyphone.com
arogyamfarms.com
outletamigo.com
musannafashion.com
dtrixxx.com
quickandeasygroup.com
rawhustleapparel.com
care.land
charmingoneboutique.com
xn--fllessang-g3a.com
trendandjobs.online
voxmediation.com
alkawtherabudhabi.com
peeledeye.com
mcgillfamilylaw.com
prokit.net
my-safebaby.com
bookatalia.com
utilking.com
jhondavid.com
onpassivewithval.com
gtelemed.com
playfighterstube.com
bestfreezerstorage.com
kichnpro.com
sanjeevanicreation.com
allturdsmatter.com
picklebarreldillivers.com
clinversity.com
keystogce.com
bistrolartichaut.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3248-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
14073747c219f890f793300d883dc11e_JaffaCakes118.exedescription pid process target process PID 1884 set thread context of 3248 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 14073747c219f890f793300d883dc11e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
14073747c219f890f793300d883dc11e_JaffaCakes118.exe14073747c219f890f793300d883dc11e_JaffaCakes118.exepid process 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 3248 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 3248 14073747c219f890f793300d883dc11e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
14073747c219f890f793300d883dc11e_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
14073747c219f890f793300d883dc11e_JaffaCakes118.exedescription pid process target process PID 1884 wrote to memory of 3020 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 14073747c219f890f793300d883dc11e_JaffaCakes118.exe PID 1884 wrote to memory of 3020 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 14073747c219f890f793300d883dc11e_JaffaCakes118.exe PID 1884 wrote to memory of 3020 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 14073747c219f890f793300d883dc11e_JaffaCakes118.exe PID 1884 wrote to memory of 3248 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 14073747c219f890f793300d883dc11e_JaffaCakes118.exe PID 1884 wrote to memory of 3248 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 14073747c219f890f793300d883dc11e_JaffaCakes118.exe PID 1884 wrote to memory of 3248 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 14073747c219f890f793300d883dc11e_JaffaCakes118.exe PID 1884 wrote to memory of 3248 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 14073747c219f890f793300d883dc11e_JaffaCakes118.exe PID 1884 wrote to memory of 3248 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 14073747c219f890f793300d883dc11e_JaffaCakes118.exe PID 1884 wrote to memory of 3248 1884 14073747c219f890f793300d883dc11e_JaffaCakes118.exe 14073747c219f890f793300d883dc11e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14073747c219f890f793300d883dc11e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14073747c219f890f793300d883dc11e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\14073747c219f890f793300d883dc11e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14073747c219f890f793300d883dc11e_JaffaCakes118.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\14073747c219f890f793300d883dc11e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14073747c219f890f793300d883dc11e_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1884-6-0x0000000005470000-0x00000000054C6000-memory.dmpFilesize
344KB
-
memory/1884-8-0x0000000005560000-0x000000000556A000-memory.dmpFilesize
40KB
-
memory/1884-2-0x0000000005180000-0x000000000521C000-memory.dmpFilesize
624KB
-
memory/1884-3-0x00000000057D0000-0x0000000005D74000-memory.dmpFilesize
5.6MB
-
memory/1884-4-0x00000000052C0000-0x0000000005352000-memory.dmpFilesize
584KB
-
memory/1884-5-0x0000000005240000-0x000000000524A000-memory.dmpFilesize
40KB
-
memory/1884-1-0x0000000000730000-0x0000000000916000-memory.dmpFilesize
1.9MB
-
memory/1884-7-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/1884-0-0x00000000751FE000-0x00000000751FF000-memory.dmpFilesize
4KB
-
memory/1884-9-0x00000000751FE000-0x00000000751FF000-memory.dmpFilesize
4KB
-
memory/1884-10-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/1884-11-0x0000000005740000-0x000000000579C000-memory.dmpFilesize
368KB
-
memory/1884-14-0x00000000751F0000-0x00000000759A0000-memory.dmpFilesize
7.7MB
-
memory/3248-12-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3248-15-0x0000000001590000-0x00000000018DA000-memory.dmpFilesize
3.3MB