Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe
-
Size
14KB
-
MD5
822bfd7e6b9a02844e5b52fdc971bcdd
-
SHA1
a66315e4bc32830158549601eb8c02d89e616bad
-
SHA256
c90168203989a5d0e8a10cbb0753d83efad01793b94fd6480701059df2529d4f
-
SHA512
8b3d33b04f09388e9e7ca8b4c5138249e109780e318f002ef87b8f36ab9d441a85bf6270b2885d33dfe93bde8f027512311871aedbea9e738544faf162e50b7f
-
SSDEEP
192:W1UugtKtPRaEdxKYRrRbZxh+F1lZ48CAZ8Ll6t+6PzKrd0As+2Dnznz3s34rbxgp:WZhRMF1DHOUrK5z6XI4r1gIG
Malware Config
Extracted
formbook
4.1
ysl
descansosnm.com
ciastaniespodzianka.store
jeeugae.com
cleanfunnies.com
gaywelove.com
setecandeeiroscaja.com
lacafe.rest
fuyujen.com
hit-community.com
docusharego.com
urquell-energie-code.com
pattycordeiro.com
40momentive.com
hydrogengascars.com
focusdekalb.com
sandiegorealestate.report
agence-comy.com
wgtseguros.com
bajajloangroup.com
securefedegestion.com
cashflowtoday.net
southernlightshamanic.com
puertococo.com
powntakespawn.com
destinyhouseacton.com
kouk.company
cbdyourpainaway.com
engolish.com
domennyarendi57.net
electricbikeparadise.net
davidattewell.net
oregonrainsoup.com
brantleyboys.com
shopowlrepairs.com
njconsideritdone.com
mattropolisva.com
jump-teen.net
hivepublications.com
hpthzs.com
crechelagoa.com
tacomafurnacepro.com
littleredrocketproductions.com
sailingseassolitaire.com
familymotorhomehire.com
chesterardolino.com
homapilot.com
everydaypicnics.com
enigmaunit.com
shifenglny.com
championshiptables.com
boutique-charles.com
walkiesau.com
townelegal.com
fivefourtransport.com
aplofer.info
concisereceipes.com
jandfcleaning.net
kzlnjm.com
gentlemenrise.com
mtunitedllc.com
tsdlocalreputationmarketing.com
buffaloclass.com
top10hacks.com
trinitymagik.com
officecleaningservices.pro
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe\"" 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe -
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4224-8-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4224-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe" 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 pastebin.com 20 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3168 set thread context of 4224 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 97 PID 4224 set thread context of 3436 4224 installutil.exe 55 PID 3388 set thread context of 3436 3388 wlanext.exe 55 -
Program crash 1 IoCs
pid pid_target Process procid_target 1268 3168 WerFault.exe 82 -
Delays execution with timeout.exe 1 IoCs
pid Process 4748 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 4224 installutil.exe 4224 installutil.exe 4224 installutil.exe 4224 installutil.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe 3388 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4224 installutil.exe 4224 installutil.exe 4224 installutil.exe 3388 wlanext.exe 3388 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe Token: SeDebugPrivilege 4224 installutil.exe Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeDebugPrivilege 3388 wlanext.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3436 Explorer.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3168 wrote to memory of 4748 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 83 PID 3168 wrote to memory of 4748 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 83 PID 3168 wrote to memory of 4748 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 83 PID 3168 wrote to memory of 560 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 94 PID 3168 wrote to memory of 560 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 94 PID 3168 wrote to memory of 560 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 94 PID 3168 wrote to memory of 4936 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 95 PID 3168 wrote to memory of 4936 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 95 PID 3168 wrote to memory of 4936 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 95 PID 3168 wrote to memory of 2108 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 96 PID 3168 wrote to memory of 2108 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 96 PID 3168 wrote to memory of 2108 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 96 PID 3168 wrote to memory of 4224 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 97 PID 3168 wrote to memory of 4224 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 97 PID 3168 wrote to memory of 4224 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 97 PID 3168 wrote to memory of 4224 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 97 PID 3168 wrote to memory of 4224 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 97 PID 3168 wrote to memory of 4224 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 97 PID 3168 wrote to memory of 4224 3168 822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe 97 PID 3436 wrote to memory of 3388 3436 Explorer.EXE 100 PID 3436 wrote to memory of 3388 3436 Explorer.EXE 100 PID 3436 wrote to memory of 3388 3436 Explorer.EXE 100 PID 3388 wrote to memory of 3700 3388 wlanext.exe 103 PID 3388 wrote to memory of 3700 3388 wlanext.exe 103 PID 3388 wrote to memory of 3700 3388 wlanext.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:4748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵PID:560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵PID:4936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵PID:2108
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 18363⤵
- Program crash
PID:1268
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵PID:3700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3168 -ip 31681⤵PID:4992