Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe
-
Size
490KB
-
MD5
82ad6d4689e3490835817606958cf5fa
-
SHA1
95040b9910f5d2a54323e1d88cfbff152b22f87d
-
SHA256
f1e9550490c3ff70c5a36623d87419084d07fe0d8f6590cc411aa15d5c9d769b
-
SHA512
818dd1930f6728b9050692588e344e2a3fdae5f0ba5fe80b7c39a6181f679cfa9ea41450ec30dec6c9a5440d74b2fd19d0a239ab77a986537661e82035082ce8
-
SSDEEP
12288:P1clJL7+GuvYWnePtWZ80dLAtlr4BP6ahH5ehx3q/lgt:P1cfNuvz805g4P6Aoh
Malware Config
Extracted
formbook
4.1
vd9n
theunwrappedcollective.com
seckj-ic.com
tyresandover.com
thetrophyworld.com
fonggrconstruction.com
hopiproject.com
sktitle.com
charlotteobscurer.com
qjuhe.com
girlzglitter.com
createmylawn.com
hempcbgpill.com
zzdfdzkj.com
shreehariessential.com
226sm.com
getcupscall.com
neuralviolin.com
sanskaar.life
xn--fhqrm54yyukopc.com
togetherx4fantasy5star.today
buyonlinesaree.com
percyshandman.site
hatchethangout.com
rugpat.com
zen-gizmo.com
vipmomali.com
lacerasavall.cat
aqueouso.com
mkolgems.com
sevenhundredseventysix.fund
fotografhannaneret.com
mitravy.com
bmtrans.net
linterpreting.com
izquay.com
sawaturkey.com
marche-maman.com
eemygf.com
animenovel.com
travelssimply.com
montecitobutterfly.com
volebahis.com
daniela.red
ramseyedk12.com
leyterealestate.info
patriotstrong.net
vkgcrew.com
nadhiradeebaazkiya.online
hotelcarre.com
myfabulouscollection.com
stellantis-luxury-rent.com
hn2020.xyz
emilyscopes.com
lotosouq.com
lovecord.date
stconstant.online
volkite-culverin.net
allwaysautism.com
sheisnatashasimone.com
sepantaceram.com
ishopgrady.com
lifestorycard.com
sexybbwavailable.website
domainbaycapital.com
constructioncleanup.pro
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2708-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2708-21-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1676 set thread context of 2708 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 33 PID 2708 set thread context of 1204 2708 RegSvcs.exe 21 PID 2712 set thread context of 1204 2712 ipconfig.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2712 ipconfig.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2920 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 2708 RegSvcs.exe 2708 RegSvcs.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe 2712 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2708 RegSvcs.exe 2708 RegSvcs.exe 2708 RegSvcs.exe 2712 ipconfig.exe 2712 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe Token: SeDebugPrivilege 2708 RegSvcs.exe Token: SeDebugPrivilege 2712 ipconfig.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2920 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 31 PID 1676 wrote to memory of 2920 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 31 PID 1676 wrote to memory of 2920 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 31 PID 1676 wrote to memory of 2920 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 31 PID 1676 wrote to memory of 2708 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 33 PID 1676 wrote to memory of 2708 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 33 PID 1676 wrote to memory of 2708 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 33 PID 1676 wrote to memory of 2708 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 33 PID 1676 wrote to memory of 2708 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 33 PID 1676 wrote to memory of 2708 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 33 PID 1676 wrote to memory of 2708 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 33 PID 1676 wrote to memory of 2708 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 33 PID 1676 wrote to memory of 2708 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 33 PID 1676 wrote to memory of 2708 1676 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 33 PID 1204 wrote to memory of 2712 1204 Explorer.EXE 34 PID 1204 wrote to memory of 2712 1204 Explorer.EXE 34 PID 1204 wrote to memory of 2712 1204 Explorer.EXE 34 PID 1204 wrote to memory of 2712 1204 Explorer.EXE 34 PID 2712 wrote to memory of 2640 2712 ipconfig.exe 35 PID 2712 wrote to memory of 2640 2712 ipconfig.exe 35 PID 2712 wrote to memory of 2640 2712 ipconfig.exe 35 PID 2712 wrote to memory of 2640 2712 ipconfig.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jTKDRWKHtz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5496.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-