Analysis
-
max time kernel
106s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
9f9ff2c8998e81058d583369b7a496de
-
SHA1
8fc0b5f4d6100e438fc734eb2082ba237efe0652
-
SHA256
579d13f3cd7acab8f6b9711c99fef396a325efad3a11a6cccb261437af1619a9
-
SHA512
98235d57d8395d89e9da377a48129aaf97640ea4fdddae65c4b5e1ae330d4b6911272ac953284fa8e752e28e3e0075b0dc153393c587c9a04ac24ac5481697bc
-
SSDEEP
12288:8WHyGfJqDJLZCpzeCptoDFjmjRPTjRPyjBjjijBjBjBjBjLjVA7nNi6HCZoU9+kw:rqqNeK2DgA7nNxCZLYHkgiPgp
Malware Config
Extracted
formbook
4.1
2kf
edmondscakes.com
doublewldr.online
tickets2usa.com
heyhxry.com
weightloss-gulfport.com
prosselius.com
newviewroofers.com
jacksonarearealestate.com
catparkas.xyz
pagos2020.com
sonwsefjrahi.online
franchisethings.com
nuocvietngaynay.com
sohelvai.com
mikeyroush.com
lamesaroofing.com
betbigo138.com
amazon-service-recovery.com
clockin.net
riostrader.com
novergi.com
bounethone.online
unsaluted-muckworm.info
qmglg.com
trans-chna.com
bloom-cottage.info
espacioholista.com
vitrines72.com
vtnywveb.club
shelfdryrock.com
lowcountrykindermusik.com
brendolangiovanni.com
samilisback.com
coffeeofmyheart.com
moderndetailist.com
royalparkhotelandsuites.com
camsick.com
khoetuthiennhien.com
link-glue.com
zzirk.com
alyxthorne.com
tristateinsurancegroup.com
pdztwl.com
basecampmedics.com
orionbilisim.net
comaholic.com
sai-re.com
mimmodetullio.net
thevyvd.com
bookstorie.com
preparednessnow.net
lvtvmounting.com
anchondowedding.com
the-florida-accident-md.com
indyspirits.com
culture-of-safety.com
blue-003.com
federation-advens.com
junmedicare.com
qjnhilfhs.icu
chesed72.com
kingrvrentals.com
greenlightsuccesscoach.com
efrenjose.com
midnightblueinc.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2972-21-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1308 set thread context of 2972 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2972 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1556 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 31 PID 1308 wrote to memory of 1556 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 31 PID 1308 wrote to memory of 1556 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 31 PID 1308 wrote to memory of 1556 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 31 PID 1308 wrote to memory of 2972 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 33 PID 1308 wrote to memory of 2972 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 33 PID 1308 wrote to memory of 2972 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 33 PID 1308 wrote to memory of 2972 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 33 PID 1308 wrote to memory of 2972 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 33 PID 1308 wrote to memory of 2972 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 33 PID 1308 wrote to memory of 2972 1308 9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\puJzcbEe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8CB5.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f9ff2c8998e81058d583369b7a496de_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57449fcd7a4916c10cd198d15fdbc7d0d
SHA113cc13009f77ef627721e1a16f945dde1dcd0082
SHA256a11f11aea498acf9f1c8659a9766f3342c03084d1ce1eeb9c83afc8fe689115f
SHA512f81ed63f42ea14bbea5a6ffc8dc9e22d5784b8e13536b4c4c4514994c294238f9057b91e001e2729e5768c2c4d87ec44dc5ec0ecfc0039e0ce886f74d1fc24c2