Analysis Overview
SHA256
9f59a9c7a38d8031c5b0829da6c4c10951b1de67adada4f567449d4b6ea8d83c
Threat Level: Known bad
The file c052190b60d83304962baa2f4381ee06_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Formbook
Formbook payload
Loads dropped DLL
Suspicious use of SetThreadContext
Unsigned PE
Enumerates physical storage devices
Program crash
NSIS installer
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-04 19:06
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-04 19:06
Reported
2024-04-04 19:09
Platform
win7-20240221-en
Max time kernel
118s
Max time network
118s
Command Line
Signatures
Formbook
Formbook payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1940 set thread context of 2968 | N/A | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 468
Network
Files
\Users\Admin\AppData\Local\Temp\nso1279.tmp\pjzghir.dll
| MD5 | 42913016238730a9aed1e2246f26e944 |
| SHA1 | 23af57bdd8fcef04ff222d4945a92e27685e0f53 |
| SHA256 | 0e379293c9b084834bbc33561278ec9c8df126ba38e99f79640d5e76a7838745 |
| SHA512 | 86c5b94353a6bfa0c7a5a519af32ec198c48da8f12244cbca71091033e47b56f17267d73d5d2192cb34fef1005061ee3e4e4c1f508c3dd3748a22415f15bed32 |
memory/2968-8-0x0000000000400000-0x000000000042F000-memory.dmp
memory/2968-11-0x0000000000700000-0x0000000000A03000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-04 19:06
Reported
2024-04-04 19:09
Platform
win10v2004-20231215-en
Max time kernel
145s
Max time network
146s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1696 wrote to memory of 4892 | N/A | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe |
| PID 1696 wrote to memory of 4892 | N/A | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe |
| PID 1696 wrote to memory of 4892 | N/A | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\c052190b60d83304962baa2f4381ee06_JaffaCakes118.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 1696 -ip 1696
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 976
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| US | 138.91.171.81:80 | tcp | |
| US | 8.8.8.8:53 | 241.66.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 202.110.86.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 137.71.105.51.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\nsc3FC9.tmp\pjzghir.dll
| MD5 | 42913016238730a9aed1e2246f26e944 |
| SHA1 | 23af57bdd8fcef04ff222d4945a92e27685e0f53 |
| SHA256 | 0e379293c9b084834bbc33561278ec9c8df126ba38e99f79640d5e76a7838745 |
| SHA512 | 86c5b94353a6bfa0c7a5a519af32ec198c48da8f12244cbca71091033e47b56f17267d73d5d2192cb34fef1005061ee3e4e4c1f508c3dd3748a22415f15bed32 |
Analysis: behavioral3
Detonation Overview
Submitted
2024-04-04 19:06
Reported
2024-04-04 19:09
Platform
win7-20240221-en
Max time kernel
121s
Max time network
122s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\pjzghir.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\pjzghir.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 236
Network
Files
Analysis: behavioral4
Detonation Overview
Submitted
2024-04-04 19:06
Reported
2024-04-04 19:09
Platform
win10v2004-20240226-en
Max time kernel
149s
Max time network
152s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4924 wrote to memory of 700 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4924 wrote to memory of 700 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4924 wrote to memory of 700 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\pjzghir.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\pjzghir.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 700 -ip 700
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 664
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.179.89.13.in-addr.arpa | udp |