Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe
-
Size
659KB
-
MD5
20ce27d410e9cb9d9ac96ab615e607c6
-
SHA1
1132b5764975577b8f26c8b3cf9b2b17aa51a095
-
SHA256
4d0418d6ed89ac0dd6a7be7b8b73fbf85d69e0823ce8e392398b3ad005d5839f
-
SHA512
f6c9433178e992feaef4f36807dee4cb2e19e268284f5cb8515b4b217e23aff3c1e35d8ac5fe20908ee4e4d3341e7e7a8cc0dd91af0a7d837d244c5481c6f4b8
-
SSDEEP
12288:gYxBYG+2AM0TFoei0W+7Bt7NNdO9AbrPJnwJo6UWa3urQ:dxBYiWSe2oBt7Nu23cmWG
Malware Config
Extracted
formbook
4.1
gbl
dx268.com
textbot4you.com
critictable.com
fsclub.info
order-review.com
tkgenergy.com
contavip.info
fashionests.com
sieromart.com
miamimobiletesting.com
oxforhabits.com
yugoslavilk.online
inieenterprises.com
bythebucketfranchise.com
parcelified.com
signalcyclers.com
starryeyedproject.com
proteacherstore.com
horos.tech
bovadaracebook.sucks
goldankauf-innsbruck.net
thecreepercartel.com
sreed-author.com
spezzasanitizationservice.com
menz-world.com
naigves.com
cottonlandboutique.com
c-oilyprescriptions.com
deepsnowart.com
pgcpsmdc.com
mysecretwhore.com
khiladitheplayer.net
ctpolicetransparency.com
brooks-boutique.com
emotiveexchange.com
stavkinasport1xbet.com
bodysense.online
sosostenible.com
dilinbang.net
mahakayatm.com
iwebsrvc.info
bseisu.com
elvinejackets.com
gteless.net
copccam.icu
brokercrypto.com
rms-africa.com
itsn-u.com
projectxecute.com
earndollarsinaflash.com
hookah-lounge.online
thcgoldoil.com
bikesbeardsbbq.com
williamzhao.design
hackersdealers.com
bobbybonesforpresident.com
ohmosa.com
methodactingstudio.com
wrfyqa.com
newcovenantcc.com
burritosfordogs.com
heidisophiabobia.com
xqy193.com
yaygroups.com
manimeenaja.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2512-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exedescription pid process target process PID 2236 set thread context of 2512 2236 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exepid process 2512 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exedescription pid process target process PID 2236 wrote to memory of 2512 2236 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe PID 2236 wrote to memory of 2512 2236 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe PID 2236 wrote to memory of 2512 2236 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe PID 2236 wrote to memory of 2512 2236 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe PID 2236 wrote to memory of 2512 2236 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe PID 2236 wrote to memory of 2512 2236 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe PID 2236 wrote to memory of 2512 2236 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe 20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\20ce27d410e9cb9d9ac96ab615e607c6_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2236-6-0x0000000004F80000-0x0000000004FE4000-memory.dmpFilesize
400KB
-
memory/2236-1-0x0000000010400000-0x00000000104AA000-memory.dmpFilesize
680KB
-
memory/2236-2-0x0000000074250000-0x000000007493E000-memory.dmpFilesize
6.9MB
-
memory/2236-3-0x0000000000540000-0x000000000054A000-memory.dmpFilesize
40KB
-
memory/2236-4-0x000000007425E000-0x000000007425F000-memory.dmpFilesize
4KB
-
memory/2236-5-0x0000000074250000-0x000000007493E000-memory.dmpFilesize
6.9MB
-
memory/2236-0-0x000000007425E000-0x000000007425F000-memory.dmpFilesize
4KB
-
memory/2236-14-0x0000000074250000-0x000000007493E000-memory.dmpFilesize
6.9MB
-
memory/2512-8-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2512-13-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2512-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2512-9-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2512-15-0x00000000009C0000-0x0000000000CC3000-memory.dmpFilesize
3.0MB