General
-
Target
a5be0b9593c1d43cba68afca025a4ddc_JaffaCakes118
-
Size
397KB
-
Sample
240818-hb6nwatbnq
-
MD5
a5be0b9593c1d43cba68afca025a4ddc
-
SHA1
520e77e14812d09b951c031de0cf1138c99ab6e4
-
SHA256
2a1a592d715bc79f96f5242986ccecab6803f00bf5c9345c99f3ef76a5d3b76a
-
SHA512
518febfb9ec60a3508336ec0ec3623c6681c76568dc80df2669036d8e4d906bebc98426038aa964401a834b0273caae655002291fb40480e79b10b8ff4d3b2fc
-
SSDEEP
12288:SaESokFZ3ArVYDrMpegeTaU0L2SQsGBMB:SaESv3ArVb7oaUojz
Static task
static1
Behavioral task
behavioral1
Sample
a5be0b9593c1d43cba68afca025a4ddc_JaffaCakes118.exe
Resource
win7-20240705-en
Malware Config
Extracted
formbook
4.1
iesn
blockchain-refund.com
abogapy.com
ztron.energy
imadeit.club
gurdwarateghbahadur.com
dovetail-consulting.com
vampsy.xyz
beharrs.com
123ecole.com
silver2wear.online
ashwastaken.com
poincianaflowersevents.com
hyperdogetoken.com
optmsg.com
milanostyle15.com
ibisai.net
pknox.net
seedthrough.com
youngvan.com
gate2hydrogen.com
hybridrteserve.com
solutionrd.com
bugsonarock.com
cm2uniformes.com
bitracks56.com
agespray.com
ucccoin.biz
mammutclearanceuk.com
sheller.net
yun.one
nursingrehab.net
superfoodsnederland.com
lenyleon.com
bentonvillesquareartist.com
vastvessel.com
cqskmc.com
shellys-shepherds.com
antnestlimited.com
piloubearn.com
kaisen-ace.biz
crystaltopagent.com
momsmealls.com
mv2alrts.com
ulsp3.xyz
crowndcelltherapy.com
lasjaras.online
fruitfulvinebirth.com
tcsm8.com
xn--n-4eu3a3g1fm43r2vxc.xyz
brikh.com
oupalm.com
contact6.email
xn--mgbbwgh5iimre.com
wasl.xyz
mundrisoftglobal.com
arungjerampangalengan.com
chitranshpublication.com
wesleyburger.com
reseeker.com
patiofactorysupercenter1.net
diyetema.xyz
wedenpay.com
asjjjt.com
extremeresultsteam.com
netizenstrong.com
Targets
-
-
Target
a5be0b9593c1d43cba68afca025a4ddc_JaffaCakes118
-
Size
397KB
-
MD5
a5be0b9593c1d43cba68afca025a4ddc
-
SHA1
520e77e14812d09b951c031de0cf1138c99ab6e4
-
SHA256
2a1a592d715bc79f96f5242986ccecab6803f00bf5c9345c99f3ef76a5d3b76a
-
SHA512
518febfb9ec60a3508336ec0ec3623c6681c76568dc80df2669036d8e4d906bebc98426038aa964401a834b0273caae655002291fb40480e79b10b8ff4d3b2fc
-
SSDEEP
12288:SaESokFZ3ArVYDrMpegeTaU0L2SQsGBMB:SaESv3ArVb7oaUojz
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-