Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 23:18
Static task
static1
Behavioral task
behavioral1
Sample
50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe
-
Size
264KB
-
MD5
50282da5093e3086fcde377c5e8e28bd
-
SHA1
f8468c9953686b0b77dfb6949866c68b628ce73d
-
SHA256
ca49aa362621679944ff2bb5c323dbb64ef5f0364dff1be6168c0657962296ec
-
SHA512
7a60e543a0b918591c7dcec8286175ce3c2e746c18055ac5439a9790469b9152ab2f50be6dc7d8f70d0b4002e7b51a9e32a685befb83dc971311deca65c46818
-
SSDEEP
6144:G/HhXZxNiTGAATtFH0zpVVDkYx7pvX9GD:iXZykBFHApVVLFdXsD
Malware Config
Extracted
formbook
3.9
j0g2z5t
nikolajslot.com
buysellhkonline.com
citytireandmuffler.com
moodichocolate.com
hiresses.com
1577584.com
chantaljamet.com
madamrichest.com
catfooddude.com
the9-city.com
dota2.red
risottomyway.com
cmbgw.com
ospreylandingfl.com
nmkindustries.com
video-cuentos.com
rktcont.net
suresourcetreatment.com
molinaroscollision.com
femmefetefashions.com
alpenjuwele.com
anglocatholicradical.info
bybreining.com
globalxpresskc.com
ipr1source.com
thealchemymovement.com
nonprofotorganization.net
jpmgchb.com
0d8seveninto.men
wedunder.com
freetvagents.link
coppermountainhemp.com
claymckell.com
lotterypussy.com
fppcb.com
myfamilymyteam.com
chasteart.com
privatetutorraleigh.info
barbarauehlimger.com
oilesen.com
bxjvwy.men
yourway-store.com
alfredstindustires.com
deskexerciseequipment.com
demolition-technology.com
skycells.net
klinikfertility.com
jsycjljx.com
efrealodinge.com
tinselandtreen.com
cryptograve.com
xn--ok0br4kv9c0xbb26a.net
multiservortega.com
cdn-network23-server2.biz
account-reported.info
djavilo.com
xn--tlqx19bfhr.com
affiliate-money-no-tubo.net
xn--1lq90if68afyhn1m.com
mattress-saletoday.sale
dementsmechanical.net
xn--cjr30j9und6muv6c.com
noli.ltd
soalanramalan.com
okundread.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2428-8-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exedescription pid process target process PID 3812 set thread context of 2428 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exepid process 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe 2428 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe 2428 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exedescription pid process Token: SeDebugPrivilege 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exedescription pid process target process PID 3812 wrote to memory of 932 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe schtasks.exe PID 3812 wrote to memory of 932 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe schtasks.exe PID 3812 wrote to memory of 932 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe schtasks.exe PID 3812 wrote to memory of 2428 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe PID 3812 wrote to memory of 2428 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe PID 3812 wrote to memory of 2428 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe PID 3812 wrote to memory of 2428 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe PID 3812 wrote to memory of 2428 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe PID 3812 wrote to memory of 2428 3812 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe 50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvxEzXiV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4E3F.tmp"2⤵
- Creates scheduled task(s)
PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\50282da5093e3086fcde377c5e8e28bdJaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD578f9992e5c2ea93a72077a101d6b99db
SHA117054c9674c3736b1b6b888e542a4be0dff826b7
SHA256fdab9bdab2abffd89d195752efd4b740bedd894eadd6c09495bcebeee83d4cbd
SHA512c705664731f15949521f2146fb25a790e1e5b7abbc2f31f70675acc282e5efdb09726f604b703eea54976f1f8e221daf5e2f6ab0d8203a941831084e6b2baaa9