Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 22:27
Static task
static1
Behavioral task
behavioral1
Sample
c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe
-
Size
955KB
-
MD5
c1b83daeb8757d575a940c65bccb0d1b
-
SHA1
857e57fbce938345d8baea856ce232179627e995
-
SHA256
c1191a2395a4bcd7c12c63ed628be5c3df1ab0d0b51d46932716fb0c917c0dde
-
SHA512
8a8f80c1de2c2fed85091160b1c6c3912b43ed5627d05abb7a8a713a41bf1edfac06e8bd6023925a82b56eafa5340ed4880705588c5e6b405bf70e6cd7b8c3e9
-
SSDEEP
12288:/6FSCKAIMqmB0a08IEvs81TMe1vJrW5/n8T8S/5uEJ52:a1fI00z8IR81Tdx+8oE3J
Malware Config
Extracted
formbook
4.1
mdi
uproarcatalyst.com
cruisessafaris.com
simplethreads.net
ncsetup.com
dthengjia.com
heyfig.com
inventqa.com
mentoriareset.com
a70a.com
ncolesrose.com
culasarsa.com
southdocknj.com
pistrinalove.com
championvanleasing.com
mazda40.com
lujoscenter.com
wgsol.com
iheart2d.com
olympiccarpetcare.com
aiored.com
nirvananaturalcbd.info
elevatewithpatty.com
tnrfuels.com
nasiumm.com
bloomnbrewcafe.com
buyselljetfuel.com
dmiqmgj.icu
kestria.global
hotposy.com
livecricket.website
bhbaz.com
tanjrah.com
turkalgroup.com
ymlp-315.com
gzoasishotel.com
qiuyixb.com
northernlsx.com
boykinspto.com
refundoftaxsurplus.com
marcuschaiproperty.com
lojadatwo.com
livefrommattshouse.com
varalashes.life
lexisale.com
brocamax.com
edsheerantribute.com
oppandhope.com
postagejessica.icu
milleniavanlife.com
adrend.club
ibizanomadyoga.com
3a8yuw.com
eliteroofsolar.com
azerni.com
truthware.net
covidisnotanexcuse.com
tribalartandculture.com
fivedine.com
joker718.com
improvemynews.com
solutionsemissao.com
traversecitymanor.com
sundtctyka.club
whitewolfofpustleben.com
adhyapikaonline.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2732-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 332 set thread context of 2732 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 2732 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 332 wrote to memory of 2868 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 31 PID 332 wrote to memory of 2868 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 31 PID 332 wrote to memory of 2868 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 31 PID 332 wrote to memory of 2868 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 31 PID 332 wrote to memory of 2732 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 33 PID 332 wrote to memory of 2732 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 33 PID 332 wrote to memory of 2732 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 33 PID 332 wrote to memory of 2732 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 33 PID 332 wrote to memory of 2732 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 33 PID 332 wrote to memory of 2732 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 33 PID 332 wrote to memory of 2732 332 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\taoLqqCfkCGUj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDD64.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51415b939b6f997ec4c23151aa5043f91
SHA1a4be381c678a9f451b33cbdbd45f6ee9b6b2fedd
SHA2562b28a055611bdfe33cabc1c87fd8c487ebbcd389bf919bafadf33473093d3784
SHA51205970d465690e752e2a0b27fff1c80d1af95b5f3f8af43ba928ab3fca4196e0419ae96d6b3216a3913d2e562b24b1cf4e04ea25298f1afaebff6dc1befc90d2f