Analysis Overview
SHA256
f275914dc6eafbd3969add494c8193c5caceb4f34bc44c406dc6969c25dc13e8
Threat Level: Known bad
The file 9c752189cf910e148831cce494096ca9_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Formbook
Formbook payload
Suspicious use of SetThreadContext
Program crash
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of UnmapMainImage
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies registry class
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-04-03 01:31
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-03 01:31
Reported
2024-04-03 01:33
Platform
win7-20240221-en
Max time kernel
150s
Max time network
123s
Command Line
Signatures
Formbook
Formbook payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2516 set thread context of 2928 | N/A | C:\Users\Admin\AppData\Local\Temp\9c752189cf910e148831cce494096ca9_JaffaCakes118.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe |
| PID 2928 set thread context of 1240 | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | C:\Windows\Explorer.EXE |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\msiexec.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\9c752189cf910e148831cce494096ca9_JaffaCakes118.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\9c752189cf910e148831cce494096ca9_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\9c752189cf910e148831cce494096ca9_JaffaCakes118.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 272
Network
Files
memory/2516-0-0x00000000743A0000-0x000000007494B000-memory.dmp
memory/2516-1-0x00000000743A0000-0x000000007494B000-memory.dmp
memory/2516-2-0x00000000006F0000-0x0000000000730000-memory.dmp
memory/2516-3-0x00000000006F0000-0x0000000000730000-memory.dmp
memory/2516-4-0x00000000743A0000-0x000000007494B000-memory.dmp
memory/2516-5-0x00000000006F0000-0x0000000000730000-memory.dmp
memory/2516-6-0x00000000006F0000-0x0000000000730000-memory.dmp
memory/2928-7-0x0000000000400000-0x000000000042F000-memory.dmp
memory/2928-9-0x0000000000400000-0x000000000042F000-memory.dmp
memory/2928-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2928-13-0x0000000000400000-0x000000000042F000-memory.dmp
memory/2516-14-0x00000000743A0000-0x000000007494B000-memory.dmp
memory/2928-15-0x0000000000BC0000-0x0000000000EC3000-memory.dmp
memory/2928-19-0x0000000000190000-0x00000000001A5000-memory.dmp
memory/1240-18-0x0000000003800000-0x0000000003900000-memory.dmp
memory/1240-20-0x00000000064F0000-0x00000000065B9000-memory.dmp
memory/2928-17-0x0000000000400000-0x000000000042F000-memory.dmp
memory/2780-21-0x0000000000D10000-0x0000000000D24000-memory.dmp
memory/2780-22-0x0000000000D10000-0x0000000000D24000-memory.dmp
memory/2780-24-0x0000000000D10000-0x0000000000D24000-memory.dmp
memory/1240-27-0x00000000064F0000-0x00000000065B9000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-03 01:31
Reported
2024-04-03 01:34
Platform
win10v2004-20240319-en
Max time kernel
150s
Max time network
153s
Command Line
Signatures
Formbook
Formbook payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1044 set thread context of 4424 | N/A | C:\Users\Admin\AppData\Local\Temp\9c752189cf910e148831cce494096ca9_JaffaCakes118.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe |
| PID 4424 set thread context of 3492 | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | C:\Windows\Explorer.EXE |
| PID 1512 set thread context of 3492 | N/A | C:\Windows\SysWOW64\svchost.exe | C:\Windows\Explorer.EXE |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ | C:\Windows\Explorer.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\9c752189cf910e148831cce494096ca9_JaffaCakes118.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\9c752189cf910e148831cce494096ca9_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\9c752189cf910e148831cce494096ca9_JaffaCakes118.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5040 --field-trial-handle=2256,i,5035714022000286426,16259316383734940314,262144 --variations-seed-version /prefetch:8
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
C:\Windows\SysWOW64\svchost.exe
"C:\Windows\SysWOW64\svchost.exe"
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 84.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.34.115.104.in-addr.arpa | udp |
| IE | 94.245.104.56:443 | tcp | |
| GB | 51.11.108.188:443 | tcp | |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.241.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| GB | 51.140.244.186:443 | tcp | |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | www.floconusa.com | udp |
| US | 8.8.8.8:53 | www.6088086.com | udp |
| HK | 20.189.122.26:80 | www.6088086.com | tcp |
| US | 8.8.8.8:53 | 26.122.189.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 35.197.79.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.anavti.com | udp |
Files
memory/1044-0-0x00000000745D0000-0x0000000074B81000-memory.dmp
memory/1044-1-0x00000000745D0000-0x0000000074B81000-memory.dmp
memory/1044-2-0x0000000000C90000-0x0000000000CA0000-memory.dmp
memory/1044-3-0x0000000000C90000-0x0000000000CA0000-memory.dmp
memory/1044-4-0x00000000745D0000-0x0000000074B81000-memory.dmp
memory/1044-5-0x0000000000C90000-0x0000000000CA0000-memory.dmp
memory/4424-6-0x0000000000400000-0x000000000042F000-memory.dmp
memory/1044-8-0x00000000745D0000-0x0000000074B81000-memory.dmp
memory/4424-9-0x0000000001270000-0x00000000015BA000-memory.dmp
memory/4424-11-0x0000000000400000-0x000000000042F000-memory.dmp
memory/3492-13-0x0000000008810000-0x0000000008971000-memory.dmp
memory/4424-12-0x0000000001040000-0x0000000001055000-memory.dmp
memory/1512-14-0x0000000000EA0000-0x0000000000EAE000-memory.dmp
memory/1512-16-0x0000000000EA0000-0x0000000000EAE000-memory.dmp
memory/1512-17-0x0000000000DE0000-0x0000000000E0F000-memory.dmp
memory/1512-18-0x0000000001B00000-0x0000000001E4A000-memory.dmp
memory/1512-19-0x0000000000DE0000-0x0000000000E0F000-memory.dmp
memory/1512-21-0x0000000001740000-0x00000000017D4000-memory.dmp
memory/3492-24-0x0000000008FC0000-0x00000000090D7000-memory.dmp
memory/3492-25-0x0000000008FC0000-0x00000000090D7000-memory.dmp
memory/3492-28-0x0000000008FC0000-0x00000000090D7000-memory.dmp