Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe
-
Size
483KB
-
MD5
f1b2c6c5ffb50b2f766def07f2bbc9f6
-
SHA1
b41d589af7dcabab0010ad37616c8edf44af8675
-
SHA256
d3a270f55d00796bc80858cfc07ee26458aa7f022664f8327b80a41adf900454
-
SHA512
a3682b6345f0f8eff28ab2caa124a87ac10592bdbdf5c4d5cc8bddab06d873a5c13dabbc8146d1c24a6e7454b396dc3539488ea2e39df209097b35abd13ab9ff
-
SSDEEP
6144:ZIFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9p:Uh8Mz+sv3y2N1xzAZprkmuN/SD5iKefT
Malware Config
Extracted
formbook
3.9
ow
piavecaffe.com
jlxkqg.men
lifesavingfoundation.net
karadasama.net
michaeltraolach-macsweeney.com
thunderwatches.com
serviciocasawhirlpool.biz
c-cap.online
itparksolution.com
clarityhearingkw.com
wpgrosiri.date
colemarshalcambell.com
webperffest.com
adjusterforirma.info
buildersqq.com
spiritualwisdominindia.com
111222333.net
traditionalarabicdishes.com
hmlifi.com
receive-our-info-heredaily.info
whitecoins.info
woodiesrattlers.com
www8458l.com
fifanie.com
xn--qrq721bqkkzt3b.net
mesquiteleaffarm.com
xn--30-yo3c105l5jn.com
imaginaryfair.com
dawnanddusted.com
youeronline.com
alyssabrandonportfolio.com
winhealthalert.info
fithappenseveryday.com
3dreplicant.net
exiaomaipu.com
billsmockupdomain.com
radicalmiddleusa.com
fatblastingsupplements.com
okvidaoapp.com
1024eees.info
gdbaisu.com
soluciones-libres.com
guansaidingzhi.com
francesca-lynagh.com
airbodycare.com
atlutes.com
learningtolaughintherain.com
zology-tek.com
bjlmzk.com
watchinglass.com
belltowerhealthcare.com
gaetvr.men
xn--j7q21wggj81l.net
photos4lyfe.net
paisaghat.com
repairextend.win
lifesciencescareers.com
bazar-199.com
timepieceluxury.com
wizeater.com
itdui.com
johnshookgp.com
lesderniers.com
goodsystemforupdates.review
cybep.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1904-20-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/1904-26-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/4400-32-0x0000000000550000-0x000000000057A000-memory.dmp formbook behavioral2/memory/4400-38-0x0000000000550000-0x000000000057A000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000\Control Panel\International\Geo\Nation f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2352 syscheck.exe 1904 syscheck.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysnet = "C:\\Users\\Admin\\AppData\\Local\\syscheck.exe -boot" syscheck.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2352 set thread context of 1904 2352 syscheck.exe 107 PID 1904 set thread context of 3460 1904 syscheck.exe 55 PID 4400 set thread context of 3460 4400 cmd.exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1904 syscheck.exe 1904 syscheck.exe 1904 syscheck.exe 1904 syscheck.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe 4400 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1904 syscheck.exe 1904 syscheck.exe 1904 syscheck.exe 4400 cmd.exe 4400 cmd.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3680 f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe Token: SeDebugPrivilege 2352 syscheck.exe Token: SeDebugPrivilege 1904 syscheck.exe Token: SeDebugPrivilege 4400 cmd.exe Token: SeShutdownPrivilege 3460 Explorer.EXE Token: SeCreatePagefilePrivilege 3460 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3680 wrote to memory of 2816 3680 f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe 98 PID 3680 wrote to memory of 2816 3680 f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe 98 PID 3680 wrote to memory of 2816 3680 f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe 98 PID 3680 wrote to memory of 3164 3680 f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe 102 PID 3680 wrote to memory of 3164 3680 f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe 102 PID 3680 wrote to memory of 3164 3680 f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe 102 PID 3164 wrote to memory of 2352 3164 cmd.exe 105 PID 3164 wrote to memory of 2352 3164 cmd.exe 105 PID 3164 wrote to memory of 2352 3164 cmd.exe 105 PID 2352 wrote to memory of 1904 2352 syscheck.exe 107 PID 2352 wrote to memory of 1904 2352 syscheck.exe 107 PID 2352 wrote to memory of 1904 2352 syscheck.exe 107 PID 2352 wrote to memory of 1904 2352 syscheck.exe 107 PID 2352 wrote to memory of 1904 2352 syscheck.exe 107 PID 2352 wrote to memory of 1904 2352 syscheck.exe 107 PID 3460 wrote to memory of 4400 3460 Explorer.EXE 108 PID 3460 wrote to memory of 4400 3460 Explorer.EXE 108 PID 3460 wrote to memory of 4400 3460 Explorer.EXE 108 PID 4400 wrote to memory of 2084 4400 cmd.exe 109 PID 4400 wrote to memory of 2084 4400 cmd.exe 109 PID 4400 wrote to memory of 2084 4400 cmd.exe 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵PID:2816
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵PID:2084
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3932,i,10943981808815347339,15838841970612097850,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:81⤵PID:4156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD5f1b2c6c5ffb50b2f766def07f2bbc9f6
SHA1b41d589af7dcabab0010ad37616c8edf44af8675
SHA256d3a270f55d00796bc80858cfc07ee26458aa7f022664f8327b80a41adf900454
SHA512a3682b6345f0f8eff28ab2caa124a87ac10592bdbdf5c4d5cc8bddab06d873a5c13dabbc8146d1c24a6e7454b396dc3539488ea2e39df209097b35abd13ab9ff