Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe
-
Size
394KB
-
MD5
212f0a0a7237ab09c82f6153361ac1b0
-
SHA1
1b84fff6041a1700f34c80a6e737e8e8c80d5770
-
SHA256
40bec545f9b01c4438a75cb03d902cc70c65ce8ecf90ecb1fb88aeb00b2c92cc
-
SHA512
232d6573a5801af940f13f97adae7f6d7a7cd38a3b61b190437f666387508db5668df77db980de3b911e2dab806587f9a486ccab5887a50f27efabb538ade348
-
SSDEEP
12288:U1zgVlrWHFZED24Ug/Q50b4Qhw+hjcnUgtICxs3IEeC:U1zgVlrWHwi4+5Y4WzhjcnUgXpE
Malware Config
Extracted
formbook
4.1
ykj
polovnitelefoni.net
cateless.com
newbeginnings.club
quanghoagroup.com
pcbet0.com
normal.computer
yoinkyoink.com
lahorekabob.com
charnal-voices.com
hotsleepspot.com
thekashmirfabrics.com
upholsteryormondbeach.com
caramel-lefilm.com
pkitales.com
truancyclub.com
susanmathason.com
sweetlimenail.com
vaaudiotechnic.site
edem-agency.com
rakkonoteineinakurashi.com
strukkbizworldonline.com
viladas.com
kevinhoffmanart.com
auroyaumedecire.com
blueskyserv.com
spaatoola.com
estoicoboliviano.com
parkinlotpimpin.com
citymantis.com
lifefrugal.com
kew-uxdesign.com
higstyle.com
hutsonfamilyinsurance.com
innovativlabor.com
organicmobiletanning.com
parmansercon.com
marktplaatsaccount.info
bldh666.com
townelegal.com
babyscornerstore.com
xinanc.com
mycampussigns.com
bakldx.com
ylwdog.com
emagrecercomhiit.com
signefi.com
testproconsulting.com
parkerfeedco.com
frostox.com
filmtencent.club
bambooglobalstore.com
islamoradakeyflorist.com
haohanvolam.com
velonesveleza.com
infomezzo.com
rorotanitim.com
360steve.com
smarteryou6d7.club
gpstecnologiamotriz.com
wvmcoop.com
sectarism-multiplied.info
kqnouwj.com
maddfella.com
jiangsufeiyue.com
farrsideofleadership.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2468-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exedescription pid process target process PID 2392 set thread context of 2468 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exepid process 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 2468 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exedescription pid process target process PID 2392 wrote to memory of 2448 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe PID 2392 wrote to memory of 2448 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe PID 2392 wrote to memory of 2448 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe PID 2392 wrote to memory of 2448 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe PID 2392 wrote to memory of 2468 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe PID 2392 wrote to memory of 2468 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe PID 2392 wrote to memory of 2468 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe PID 2392 wrote to memory of 2468 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe PID 2392 wrote to memory of 2468 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe PID 2392 wrote to memory of 2468 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe PID 2392 wrote to memory of 2468 2392 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe 212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\212f0a0a7237ab09c82f6153361ac1b0_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2392-6-0x0000000005030000-0x0000000005092000-memory.dmpFilesize
392KB
-
memory/2392-1-0x0000000000360000-0x00000000003C8000-memory.dmpFilesize
416KB
-
memory/2392-2-0x0000000073EF0000-0x00000000745DE000-memory.dmpFilesize
6.9MB
-
memory/2392-3-0x0000000000660000-0x000000000066A000-memory.dmpFilesize
40KB
-
memory/2392-4-0x0000000073EFE000-0x0000000073EFF000-memory.dmpFilesize
4KB
-
memory/2392-5-0x0000000073EF0000-0x00000000745DE000-memory.dmpFilesize
6.9MB
-
memory/2392-0-0x0000000073EFE000-0x0000000073EFF000-memory.dmpFilesize
4KB
-
memory/2392-12-0x0000000073EF0000-0x00000000745DE000-memory.dmpFilesize
6.9MB
-
memory/2468-8-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2468-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2468-11-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2468-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2468-13-0x0000000000800000-0x0000000000B03000-memory.dmpFilesize
3.0MB