Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe
-
Size
19KB
-
MD5
5c92714c7fc8fcd425c5e2ef0b4a217b
-
SHA1
d86c2586952d0082ee0b9d8f62e88356f52a4faf
-
SHA256
5567b917f6a654268f367ca76a663f87c1e9b44a997cdac64935cc4105014c08
-
SHA512
eaa139da94753953fb2b5bc02b5a9eb34913c8eb1e13a5e4dc3f81822e9c4702048e581c1725a989ed2733b528ed2da125923084c414620841b8eebc802c9179
-
SSDEEP
384:LBA6H714HOnS7B1scgfYdfeB68EDgf2h8:LBWHuS5gQEREUf2h8
Malware Config
Extracted
formbook
4.1
nds
superiortelecare.com
banxtube.com
tartonsprconstruction.com
r3msportsgroup.net
gcpplusquote-qa.com
ny004.xyz
solomonislandsforum.com
credit2wealthuniversity.com
parkavenueheightscd.com
millhillattorneys.com
gofoodreport.com
szylgy.com
bcsleadership.com
bestmichigancharters.com
financiant.com
alimentosmonteolivo.com
marastrawberry.com
centraxix.com
indexofscience.com
editorialpoints.com
tutds.com
thecareoutlet.com
makeamovie.info
awamek.com
clubprivateidaho.com
nnbi.net
zeilow.com
michaelrobertmurphy.com
thecreamlifestyle.com
suhaizat.com
blewm.com
hausoflovett.com
hkforme.com
waitmeet.com
kmk2020.com
jornalpurosangue.online
serifstore.com
loongbo.com
iusbgold.com
frankthomasmuseum.com
manastories.com
mecclp.com
autofixmosconi.com
jualbelirumah.net
klx10086.com
171records.com
3126bet.net
thelinshop.com
hossanatravels.com
sachinngarg.com
aplofer.info
mymusd.com
davidart.net
taichiforwellbeingonline.com
drthomasmorgan.com
brocontracts.com
baimazhen.com
djnasgor.com
smartcontracttraders.com
sgvbasketballclassic.com
famoussportsnews.club
michaelshingles.com
ahorn-invest.com
journeevinicole.com
cuahangsuatuoi.com
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe\"" 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe -
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/748-8-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/748-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Drops startup file 2 IoCs
Processes:
5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe" 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exepid process 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exeinstallutil.exemsdt.exedescription pid process target process PID 4740 set thread context of 748 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe installutil.exe PID 748 set thread context of 3456 748 installutil.exe Explorer.EXE PID 1264 set thread context of 3456 1264 msdt.exe Explorer.EXE -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1724 4740 WerFault.exe 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3620 timeout.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
Processes:
5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exeinstallutil.exemsdt.exepid process 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe 748 installutil.exe 748 installutil.exe 748 installutil.exe 748 installutil.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe 1264 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
installutil.exemsdt.exepid process 748 installutil.exe 748 installutil.exe 748 installutil.exe 1264 msdt.exe 1264 msdt.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exeinstallutil.exeExplorer.EXEmsdt.exedescription pid process Token: SeDebugPrivilege 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe Token: SeDebugPrivilege 748 installutil.exe Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeDebugPrivilege 1264 msdt.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3456 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exeExplorer.EXEmsdt.exedescription pid process target process PID 4740 wrote to memory of 3620 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe timeout.exe PID 4740 wrote to memory of 3620 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe timeout.exe PID 4740 wrote to memory of 3620 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe timeout.exe PID 4740 wrote to memory of 748 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe installutil.exe PID 4740 wrote to memory of 748 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe installutil.exe PID 4740 wrote to memory of 748 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe installutil.exe PID 4740 wrote to memory of 748 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe installutil.exe PID 4740 wrote to memory of 748 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe installutil.exe PID 4740 wrote to memory of 748 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe installutil.exe PID 4740 wrote to memory of 748 4740 5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe installutil.exe PID 3456 wrote to memory of 1264 3456 Explorer.EXE msdt.exe PID 3456 wrote to memory of 1264 3456 Explorer.EXE msdt.exe PID 3456 wrote to memory of 1264 3456 Explorer.EXE msdt.exe PID 1264 wrote to memory of 5012 1264 msdt.exe cmd.exe PID 1264 wrote to memory of 5012 1264 msdt.exe cmd.exe PID 1264 wrote to memory of 5012 1264 msdt.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c92714c7fc8fcd425c5e2ef0b4a217b_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 18123⤵
- Program crash
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 47401⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/748-11-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/748-8-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/748-9-0x0000000000A10000-0x0000000000D5A000-memory.dmpFilesize
3.3MB
-
memory/748-12-0x00000000009F0000-0x0000000000A04000-memory.dmpFilesize
80KB
-
memory/1264-16-0x0000000000990000-0x00000000009E7000-memory.dmpFilesize
348KB
-
memory/1264-15-0x0000000000990000-0x00000000009E7000-memory.dmpFilesize
348KB
-
memory/3456-24-0x000000000A930000-0x000000000AA9E000-memory.dmpFilesize
1.4MB
-
memory/3456-22-0x000000000A930000-0x000000000AA9E000-memory.dmpFilesize
1.4MB
-
memory/3456-20-0x000000000A930000-0x000000000AA9E000-memory.dmpFilesize
1.4MB
-
memory/3456-18-0x0000000009330000-0x0000000009414000-memory.dmpFilesize
912KB
-
memory/3456-13-0x0000000009330000-0x0000000009414000-memory.dmpFilesize
912KB
-
memory/4740-4-0x0000000005C60000-0x0000000005CAC000-memory.dmpFilesize
304KB
-
memory/4740-14-0x0000000074500000-0x0000000074CB0000-memory.dmpFilesize
7.7MB
-
memory/4740-5-0x0000000006260000-0x0000000006804000-memory.dmpFilesize
5.6MB
-
memory/4740-6-0x0000000074500000-0x0000000074CB0000-memory.dmpFilesize
7.7MB
-
memory/4740-0-0x000000007450E000-0x000000007450F000-memory.dmpFilesize
4KB
-
memory/4740-3-0x0000000074500000-0x0000000074CB0000-memory.dmpFilesize
7.7MB
-
memory/4740-2-0x00000000050E0000-0x000000000517C000-memory.dmpFilesize
624KB
-
memory/4740-1-0x0000000000860000-0x000000000086A000-memory.dmpFilesize
40KB