Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe
-
Size
483KB
-
MD5
f7e16970e5f6aec9ed1fb634bfee3269
-
SHA1
f939bfe961ac41b7a35f7763398d18248ffdf965
-
SHA256
1f7b393e44ad6fcc5273bd57a21db95f4f20ca715cab20157455edd05f87f672
-
SHA512
270f06a3ae1e17fe7db5e40c98b14d1f0be29f94921c6c357fc26be93d577d4e8564320ef010eceabfe4a9790fa9a2bcc0a5bebaf51e30b0cdd314a096e0779d
-
SSDEEP
6144:5IFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9B:0h8Mz+sv3y2N1xzAZprkmuN/SD5iKefz
Malware Config
Extracted
formbook
3.9
ow
piavecaffe.com
jlxkqg.men
lifesavingfoundation.net
karadasama.net
michaeltraolach-macsweeney.com
thunderwatches.com
serviciocasawhirlpool.biz
c-cap.online
itparksolution.com
clarityhearingkw.com
wpgrosiri.date
colemarshalcambell.com
webperffest.com
adjusterforirma.info
buildersqq.com
spiritualwisdominindia.com
111222333.net
traditionalarabicdishes.com
hmlifi.com
receive-our-info-heredaily.info
whitecoins.info
woodiesrattlers.com
www8458l.com
fifanie.com
xn--qrq721bqkkzt3b.net
mesquiteleaffarm.com
xn--30-yo3c105l5jn.com
imaginaryfair.com
dawnanddusted.com
youeronline.com
alyssabrandonportfolio.com
winhealthalert.info
fithappenseveryday.com
3dreplicant.net
exiaomaipu.com
billsmockupdomain.com
radicalmiddleusa.com
fatblastingsupplements.com
okvidaoapp.com
1024eees.info
gdbaisu.com
soluciones-libres.com
guansaidingzhi.com
francesca-lynagh.com
airbodycare.com
atlutes.com
learningtolaughintherain.com
zology-tek.com
bjlmzk.com
watchinglass.com
belltowerhealthcare.com
gaetvr.men
xn--j7q21wggj81l.net
photos4lyfe.net
paisaghat.com
repairextend.win
lifesciencescareers.com
bazar-199.com
timepieceluxury.com
wizeater.com
itdui.com
johnshookgp.com
lesderniers.com
goodsystemforupdates.review
cybep.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2616-25-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2616-30-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/1064-36-0x00000000000F0000-0x000000000011A000-memory.dmp formbook behavioral1/memory/1064-43-0x00000000000F0000-0x000000000011A000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2444 syscheck.exe 2616 syscheck.exe -
Loads dropped DLL 2 IoCs
pid Process 2476 cmd.exe 2444 syscheck.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\sysnet = "C:\\Users\\Admin\\AppData\\Local\\syscheck.exe -boot" syscheck.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2444 set thread context of 2616 2444 syscheck.exe 35 PID 2616 set thread context of 1280 2616 syscheck.exe 21 PID 1064 set thread context of 1280 1064 wininit.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2616 syscheck.exe 2616 syscheck.exe 1064 wininit.exe 1064 wininit.exe 1064 wininit.exe 1064 wininit.exe 1064 wininit.exe 1064 wininit.exe 1064 wininit.exe 1064 wininit.exe 1064 wininit.exe 1064 wininit.exe 1064 wininit.exe 1064 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2616 syscheck.exe 2616 syscheck.exe 2616 syscheck.exe 1064 wininit.exe 1064 wininit.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2356 f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe Token: SeDebugPrivilege 2444 syscheck.exe Token: SeDebugPrivilege 2616 syscheck.exe Token: SeDebugPrivilege 1064 wininit.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1884 2356 f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe 28 PID 2356 wrote to memory of 1884 2356 f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe 28 PID 2356 wrote to memory of 1884 2356 f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe 28 PID 2356 wrote to memory of 1884 2356 f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe 28 PID 2356 wrote to memory of 2476 2356 f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe 32 PID 2356 wrote to memory of 2476 2356 f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe 32 PID 2356 wrote to memory of 2476 2356 f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe 32 PID 2356 wrote to memory of 2476 2356 f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe 32 PID 2476 wrote to memory of 2444 2476 cmd.exe 34 PID 2476 wrote to memory of 2444 2476 cmd.exe 34 PID 2476 wrote to memory of 2444 2476 cmd.exe 34 PID 2476 wrote to memory of 2444 2476 cmd.exe 34 PID 2444 wrote to memory of 2616 2444 syscheck.exe 35 PID 2444 wrote to memory of 2616 2444 syscheck.exe 35 PID 2444 wrote to memory of 2616 2444 syscheck.exe 35 PID 2444 wrote to memory of 2616 2444 syscheck.exe 35 PID 2444 wrote to memory of 2616 2444 syscheck.exe 35 PID 2444 wrote to memory of 2616 2444 syscheck.exe 35 PID 2444 wrote to memory of 2616 2444 syscheck.exe 35 PID 1280 wrote to memory of 1064 1280 Explorer.EXE 36 PID 1280 wrote to memory of 1064 1280 Explorer.EXE 36 PID 1280 wrote to memory of 1064 1280 Explorer.EXE 36 PID 1280 wrote to memory of 1064 1280 Explorer.EXE 36 PID 1064 wrote to memory of 268 1064 wininit.exe 37 PID 1064 wrote to memory of 268 1064 wininit.exe 37 PID 1064 wrote to memory of 268 1064 wininit.exe 37 PID 1064 wrote to memory of 268 1064 wininit.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵PID:1884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵PID:268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD5f7e16970e5f6aec9ed1fb634bfee3269
SHA1f939bfe961ac41b7a35f7763398d18248ffdf965
SHA2561f7b393e44ad6fcc5273bd57a21db95f4f20ca715cab20157455edd05f87f672
SHA512270f06a3ae1e17fe7db5e40c98b14d1f0be29f94921c6c357fc26be93d577d4e8564320ef010eceabfe4a9790fa9a2bcc0a5bebaf51e30b0cdd314a096e0779d