Overview
overview
10Static
static
34b580aef49...18.exe
windows7-x64
104b580aef49...18.exe
windows10-2004-x64
10$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/alerting.dll
windows7-x64
3$TEMP/alerting.dll
windows10-2004-x64
3Analysis
-
max time kernel
154s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Splash.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Splash.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$TEMP/alerting.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$TEMP/alerting.dll
Resource
win10v2004-20240426-en
General
-
Target
4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe
-
Size
327KB
-
MD5
4b580aef493e3c12ff7c8c059cb73973
-
SHA1
efd2ba7c60ecd1d4e70850406d3d62f4c979eeef
-
SHA256
6999f846f01515ae48c049e1114b0cebad84d0eb047c10684eff81e9d391ad0b
-
SHA512
3822cd04861c1497241ac611bbc89b313df0d2bbd43b09f3cf1cf43ae796e4cf1254a73619f421480e5b0cd1b5e7bb36dd5d398a344e08e7f4ef091b939f22c7
-
SSDEEP
6144:r5L8cieNER8g5TNAKzLB1/1VS7EcsAFhr6RY6NLAnswHeGgoSKJLiWkFdDPNXcKd:Z8ciqEJViO1rSR56n0swHLjiBSKB9Z
Malware Config
Extracted
formbook
3.9
c191
yegua.rocks
retouraffectifrapide.com
mediacionelite.com
carrosseriemartins.com
filminglombokindonesia.com
rwpygl.info
wkwlkj.com
yjeoevqdaf.info
margaretaphotographs.com
damaskfabricandtextiles.com
woofgang.life
goodhabitsapp.com
kunweishidai.com
kuaizhilian.com
parkaraya.com
globallogic-us.com
charlottephotoboothrental.com
pouchbagsupplier.com
njlgmq.com
nazreenakhtar.com
xn--95qx16a68bt48b2hp.com
adctatouage.com
furofkay.biz
snaperr.com
mcvbnw.com
freee.world
mooveassist.com
idrinkhalo.com
sieuthicomputer.com
plugiman.com
frakteel.com
xn--cgobounty-bq6d.com
wpjlh.com
atlab.info
handgjskor.com
nmgshibo.com
5diamondz.com
thebarneseatery.com
bodoghaobcn.com
retzemaschilderwerken.com
karmabypallavi.com
lofscc.online
nuwmhiygenclosures.review
onlinedesires.party
isleofskyerooms.com
sofcorrp.com
lancasterhousehunters.com
englandxstudio.com
noelleandjonjon.com
alitossb.com
mommabostic.com
laoyu-metal.com
ysxxedu.com
generositycreates.com
1199742.com
granitevillecommunity.com
divyanshienterprises.com
elcadaverexquisito.com
arinaweddingplanner.com
intencib.com
vh-vtc.com
ethicsandathletics.com
elportaldelmiedo.net
nh-yingjian.com
yodaug.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/384-100042-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/384-100046-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Loads dropped DLL 4 IoCs
Processes:
4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exepid process 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
nslookup.exewscript.exedescription pid process target process PID 384 set thread context of 3356 384 nslookup.exe Explorer.EXE PID 2900 set thread context of 3356 2900 wscript.exe Explorer.EXE -
Drops file in Windows directory 1 IoCs
Processes:
4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\win.ini 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exenslookup.exewscript.exepid process 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe 384 nslookup.exe 384 nslookup.exe 384 nslookup.exe 384 nslookup.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe 2900 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exenslookup.exewscript.exepid process 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe 384 nslookup.exe 384 nslookup.exe 384 nslookup.exe 2900 wscript.exe 2900 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
nslookup.exewscript.exedescription pid process Token: SeDebugPrivilege 384 nslookup.exe Token: SeDebugPrivilege 2900 wscript.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exedescription pid process target process PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe PID 940 wrote to memory of 384 940 4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe nslookup.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b580aef493e3c12ff7c8c059cb73973_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:384
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\nslookup.exe"3⤵PID:1100
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5899df66ecc89a8b62a4e01e719790daf
SHA181a289f7fe4560995b11c344ffe145df570a14e2
SHA256b798c94ed8f6832b83fb5c6ca5c071dcac11e363fbfd4ce34dc68ff02a77678c
SHA512300e7ac987ca9d012758ed9521c27f50a9f89440e2b5fe0ed3b3c0a48b13496c82f9ad1761a3d12e21f8622ef5a52082dd44aa30e3b97a2d6c054d2ca924cd7d
-
Filesize
4KB
MD53f35f73787f0c3bb5e59445fb18ade0d
SHA1f1566faff96c3988cfc28dc7d433094b6348cdbf
SHA2565570969d22a33c23b60c5f5536f781219e458a869b77b8dde4a94cc124ee4de6
SHA51245c42ea95f53a3b8a3fd74bd55ad6f0b3f2b91dd969104de845fd819fe307dec2b4d472bee45554500b0c51052ee82ac98196e894af806edf67a947328474e57
-
Filesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
Filesize
131B
MD59848e4efb0abd437d65e6d3d1d973adb
SHA1f427ac7c50b19f66658ae7f92cbaf21110b49a47
SHA256c8b84add37da849977a84fe62badb6cb908be99769edb70d60bcd04c0aec2a3f
SHA512f90f1f65b6b824a526469b8d739f733a54a7f485d8b5f680de7a35fac90786bf6ba5a0b1d62e139663c5ee73b8d687cf32d4ccf188e18c53084ec12d8c216b17