Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
fa3f2124cf9b027ca2b8a04df5e27cc2
-
SHA1
be0968843e1654dd2a5b7f7085226188d9276276
-
SHA256
b85055ab3db03b5496bcd19448c54dea594d8f44cc84d17f99cbf6cd9085fa2d
-
SHA512
d40399ed1c72a3907ebd8697fba492da2e71728fb8bbeb39ad01bbbc6edb7931b3902d4782d815a18c4f313b2f2d1c1425da95be6a12a8d005a3506830311c83
-
SSDEEP
24576:0ZZS5R0pULbNWrOAJPidVEHMvx1vHYY1o:03BpvJPidV5vx1v
Malware Config
Extracted
formbook
4.1
upio
thecantonmentcookhouse.com
1for1ecomask.com
thatvintagehome.com
momentbymomentmindfulness.com
denxmedia.com
arc-corner.com
siddharthmakharia.com
meiluk.com
toughu.com
hotelwisatabaru.com
ibluebelt3dbuy.com
bestfootwearhk.com
wbjobalerts.com
radiancenurestoringcleanse.com
xintianlongyeya.com
docauphuhau.com
liberty-furniture.com
ranchhousepizzaonline.com
bednhomes.com
kollakids.com
jumtix.xyz
hallbergtownhomes.com
thenewnaughty.com
thirtytwoandprospect.com
malukeji.com
minecraftmastery.com
vvww-avito.net
rheconsultoria.com
albukharyschools.com
ffully.com
christiansenlawoffice1.com
testghghgh.com
ridersbesttime.com
priyathams.com
laamin.today
tjew.club
classicvidz.com
homelandrealestateschool.com
fytwe.com
newsqribble.icu
vaxcova.com
modernankara.com
domentemenegi50.net
suryadjalil.com
tmpsytech.com
rubyclyde.com
makeupbrush.academy
pennydarbyshire.com
gobulko.com
brownbusinessowners.com
oftenchic.com
s998vip.com
tuhuertica.com
militaryhype.com
itsinthereimage.com
20revcoe.com
goodhandsclinic.com
88finxe.com
xn--gstemappe-v2a.digital
wheresbitty.com
pointdatorcida.com
jackielespiegle.com
uecdlt.com
yoshizawaryo.com
furniture-of-ironforge.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1196-38-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2740 set thread context of 1196 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2452 powershell.exe 2808 powershell.exe 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 1504 powershell.exe 1196 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe Token: SeDebugPrivilege 1504 powershell.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2452 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 30 PID 2740 wrote to memory of 2452 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 30 PID 2740 wrote to memory of 2452 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 30 PID 2740 wrote to memory of 2452 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 30 PID 2740 wrote to memory of 2808 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 33 PID 2740 wrote to memory of 2808 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 33 PID 2740 wrote to memory of 2808 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 33 PID 2740 wrote to memory of 2808 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 33 PID 2740 wrote to memory of 2628 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 35 PID 2740 wrote to memory of 2628 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 35 PID 2740 wrote to memory of 2628 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 35 PID 2740 wrote to memory of 2628 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 35 PID 2740 wrote to memory of 1504 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 37 PID 2740 wrote to memory of 1504 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 37 PID 2740 wrote to memory of 1504 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 37 PID 2740 wrote to memory of 1504 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 37 PID 2740 wrote to memory of 2176 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 39 PID 2740 wrote to memory of 2176 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 39 PID 2740 wrote to memory of 2176 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 39 PID 2740 wrote to memory of 2176 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 39 PID 2740 wrote to memory of 1196 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 40 PID 2740 wrote to memory of 1196 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 40 PID 2740 wrote to memory of 1196 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 40 PID 2740 wrote to memory of 1196 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 40 PID 2740 wrote to memory of 1196 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 40 PID 2740 wrote to memory of 1196 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 40 PID 2740 wrote to memory of 1196 2740 fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YPSemDsygYqHl.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YPSemDsygYqHl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF5E3.tmp"2⤵
- Creates scheduled task(s)
PID:2628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YPSemDsygYqHl.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe"2⤵PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa3f2124cf9b027ca2b8a04df5e27cc2_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d85d0e3fef51a478e444a9315e30f7f8
SHA1b00e3db5c4d8d3e107146f226aa6ece77f6d19f1
SHA2569b5328e540bd768c78ec57ad406804b2e0a9ca032cdb670c8f944e0b60034884
SHA51286cca1ec10ce04c6215fe36aaeedaa12252a93d808ca5be1f4d75763152dac2a1b1d7755559cdfc97aab0a8e55876e2a2f054dd436632a81a158a77b257a1014
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fa65921e8342e084376cd366cc30661e
SHA1e26a5320a10639ff6cc68c10ce7ba0c34a800856
SHA2567d4f726da86942b24193492038025b32a4e42637248afe5edc5ccf576ed0e175
SHA51262965d035fb32127cc9cfa8927890c8eb27e5cab6a0983c24cd4ab7b8a52a2220599811940b65d4aeed9bbfd7a88ac2c2df62e3d66df77a9b91aeef6f42060ec