Analysis
-
max time kernel
136s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe
-
Size
994KB
-
MD5
ad50c081824b04713a98c32b22e487f8
-
SHA1
757ca6a028d1e38efbedf24a8f957043ae22e694
-
SHA256
b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb
-
SHA512
14af69699b174feea717cf92ecf97070878969596ed10f56dd871b57a52d09fcfb154a753e0a160dbdc813e96adea63c7139744751d5a645d5c1ed530abe96e0
-
SSDEEP
12288:87mFpBYj6jRPLjRPqjBjjyjBjBjBjBjLjkeJ28I4Php94J8JVIQkxHiZ3jJDOK8H:GyBJVIQeIIpgOG75
Malware Config
Extracted
formbook
4.1
dei5
studiomullerphoto.com
reallionairewear.com
dogsalondoggy-tail.com
excelmache.net
bigdiscounters.com
7986799.com
ignition.guru
xiaoxu.info
jpinpd.com
solpool.info
uchooswrewards.com
everestengineeringworks.com
qianglongzhipin.com
deepimper-325.com
appliedrate.com
radsazemehr.com
vivabematividadesfisicas.com
capacitalo.com
somecore.com
listingclass.net
romel.codes
mybettermentor.com
hxc43.com
btccvil312723.com
rudiskenya.com
internationalrockmusic.com
wudiwifi.com
scienceacademyraj.com
tumulusinnovations.com
studioeduardobeninca.com
formabench.com
ribbonredwhiteandblue.com
miningequipmentrental.com
myamom.com
riversportswear.net
14505glenmarkdr.com
nikolcosmetic.com
toninopr.com
cutfortheconnect.com
nl22584.com
mezokovesd.com
rozhandesign.com
futbolki.space
rmobipanoshop.com
merchmuslim.com
recurrentcornealerosion.com
enottampan.com
vasquez.photos
koreanmindbeauty.com
andressabode.com
thetwolouises.com
weberbyroble.com
followmargpolo.com
englishclubb.online
sorryididnthearthat.com
greatlookfashion.club
cartoleriagrillocatania.com
esteprize.com
sdsej.com
phiecraft.xyz
psm-gen.com
passivefiresafe.com
homeyplantycosy.com
0343888.com
merckcbd.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4012-21-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3612 set thread context of 4012 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1112 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 4012 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 4012 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3612 wrote to memory of 1112 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 106 PID 3612 wrote to memory of 1112 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 106 PID 3612 wrote to memory of 1112 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 106 PID 3612 wrote to memory of 4012 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 108 PID 3612 wrote to memory of 4012 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 108 PID 3612 wrote to memory of 4012 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 108 PID 3612 wrote to memory of 4012 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 108 PID 3612 wrote to memory of 4012 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 108 PID 3612 wrote to memory of 4012 3612 ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DIvKOnF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp32FD.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad50c081824b04713a98c32b22e487f8_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e0cce6b158a0024579401096584f906b
SHA1cb67994376a8e4c4fc0778fc49dcb0c45525a18d
SHA256f6cb8e97aa54902144ab5f5e22069eacc882f1fa7fc1996214f2611f5955181a
SHA5128a53a776832620cf7ffb7b4a6fa2346c8d4c144d4079f2a1edaa9489430717ccb1ea1ff4450107b56c93acde4eda4ab888782893ece25cb7a5b31a28e4d4b5ab