Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe
-
Size
490KB
-
MD5
82ad6d4689e3490835817606958cf5fa
-
SHA1
95040b9910f5d2a54323e1d88cfbff152b22f87d
-
SHA256
f1e9550490c3ff70c5a36623d87419084d07fe0d8f6590cc411aa15d5c9d769b
-
SHA512
818dd1930f6728b9050692588e344e2a3fdae5f0ba5fe80b7c39a6181f679cfa9ea41450ec30dec6c9a5440d74b2fd19d0a239ab77a986537661e82035082ce8
-
SSDEEP
12288:P1clJL7+GuvYWnePtWZ80dLAtlr4BP6ahH5ehx3q/lgt:P1cfNuvz805g4P6Aoh
Malware Config
Extracted
formbook
4.1
vd9n
theunwrappedcollective.com
seckj-ic.com
tyresandover.com
thetrophyworld.com
fonggrconstruction.com
hopiproject.com
sktitle.com
charlotteobscurer.com
qjuhe.com
girlzglitter.com
createmylawn.com
hempcbgpill.com
zzdfdzkj.com
shreehariessential.com
226sm.com
getcupscall.com
neuralviolin.com
sanskaar.life
xn--fhqrm54yyukopc.com
togetherx4fantasy5star.today
buyonlinesaree.com
percyshandman.site
hatchethangout.com
rugpat.com
zen-gizmo.com
vipmomali.com
lacerasavall.cat
aqueouso.com
mkolgems.com
sevenhundredseventysix.fund
fotografhannaneret.com
mitravy.com
bmtrans.net
linterpreting.com
izquay.com
sawaturkey.com
marche-maman.com
eemygf.com
animenovel.com
travelssimply.com
montecitobutterfly.com
volebahis.com
daniela.red
ramseyedk12.com
leyterealestate.info
patriotstrong.net
vkgcrew.com
nadhiradeebaazkiya.online
hotelcarre.com
myfabulouscollection.com
stellantis-luxury-rent.com
hn2020.xyz
emilyscopes.com
lotosouq.com
lovecord.date
stconstant.online
volkite-culverin.net
allwaysautism.com
sheisnatashasimone.com
sepantaceram.com
ishopgrady.com
lifestorycard.com
sexybbwavailable.website
domainbaycapital.com
constructioncleanup.pro
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/444-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/444-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5112 set thread context of 444 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 91 PID 444 set thread context of 3460 444 RegSvcs.exe 56 PID 2152 set thread context of 3460 2152 control.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1880 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 444 RegSvcs.exe 444 RegSvcs.exe 444 RegSvcs.exe 444 RegSvcs.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe 2152 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 444 RegSvcs.exe 444 RegSvcs.exe 444 RegSvcs.exe 2152 control.exe 2152 control.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe Token: SeDebugPrivilege 444 RegSvcs.exe Token: SeShutdownPrivilege 3460 Explorer.EXE Token: SeCreatePagefilePrivilege 3460 Explorer.EXE Token: SeDebugPrivilege 2152 control.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3460 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5112 wrote to memory of 1880 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 89 PID 5112 wrote to memory of 1880 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 89 PID 5112 wrote to memory of 1880 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 89 PID 5112 wrote to memory of 444 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 91 PID 5112 wrote to memory of 444 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 91 PID 5112 wrote to memory of 444 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 91 PID 5112 wrote to memory of 444 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 91 PID 5112 wrote to memory of 444 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 91 PID 5112 wrote to memory of 444 5112 82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe 91 PID 3460 wrote to memory of 2152 3460 Explorer.EXE 92 PID 3460 wrote to memory of 2152 3460 Explorer.EXE 92 PID 3460 wrote to memory of 2152 3460 Explorer.EXE 92 PID 2152 wrote to memory of 32 2152 control.exe 93 PID 2152 wrote to memory of 32 2152 control.exe 93 PID 2152 wrote to memory of 32 2152 control.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82ad6d4689e3490835817606958cf5fa_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jTKDRWKHtz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7FBA.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:32
-
-