Analysis
-
max time kernel
137s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 22:27
Static task
static1
Behavioral task
behavioral1
Sample
c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe
-
Size
955KB
-
MD5
c1b83daeb8757d575a940c65bccb0d1b
-
SHA1
857e57fbce938345d8baea856ce232179627e995
-
SHA256
c1191a2395a4bcd7c12c63ed628be5c3df1ab0d0b51d46932716fb0c917c0dde
-
SHA512
8a8f80c1de2c2fed85091160b1c6c3912b43ed5627d05abb7a8a713a41bf1edfac06e8bd6023925a82b56eafa5340ed4880705588c5e6b405bf70e6cd7b8c3e9
-
SSDEEP
12288:/6FSCKAIMqmB0a08IEvs81TMe1vJrW5/n8T8S/5uEJ52:a1fI00z8IR81Tdx+8oE3J
Malware Config
Extracted
formbook
4.1
mdi
uproarcatalyst.com
cruisessafaris.com
simplethreads.net
ncsetup.com
dthengjia.com
heyfig.com
inventqa.com
mentoriareset.com
a70a.com
ncolesrose.com
culasarsa.com
southdocknj.com
pistrinalove.com
championvanleasing.com
mazda40.com
lujoscenter.com
wgsol.com
iheart2d.com
olympiccarpetcare.com
aiored.com
nirvananaturalcbd.info
elevatewithpatty.com
tnrfuels.com
nasiumm.com
bloomnbrewcafe.com
buyselljetfuel.com
dmiqmgj.icu
kestria.global
hotposy.com
livecricket.website
bhbaz.com
tanjrah.com
turkalgroup.com
ymlp-315.com
gzoasishotel.com
qiuyixb.com
northernlsx.com
boykinspto.com
refundoftaxsurplus.com
marcuschaiproperty.com
lojadatwo.com
livefrommattshouse.com
varalashes.life
lexisale.com
brocamax.com
edsheerantribute.com
oppandhope.com
postagejessica.icu
milleniavanlife.com
adrend.club
ibizanomadyoga.com
3a8yuw.com
eliteroofsolar.com
azerni.com
truthware.net
covidisnotanexcuse.com
tribalartandculture.com
fivedine.com
joker718.com
improvemynews.com
solutionsemissao.com
traversecitymanor.com
sundtctyka.club
whitewolfofpustleben.com
adhyapikaonline.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2504-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4416 set thread context of 2504 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3248 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 2504 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 2504 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3248 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 99 PID 4416 wrote to memory of 3248 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 99 PID 4416 wrote to memory of 3248 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 99 PID 4416 wrote to memory of 2504 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 101 PID 4416 wrote to memory of 2504 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 101 PID 4416 wrote to memory of 2504 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 101 PID 4416 wrote to memory of 2504 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 101 PID 4416 wrote to memory of 2504 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 101 PID 4416 wrote to memory of 2504 4416 c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\taoLqqCfkCGUj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC985.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b8ac8f4ef059c7a6ad037dc9d93a22f8
SHA1b9fb185d831b3b1c307fbd0128cb8b876e4713cd
SHA2569653954cb5c4168944b3be4067d4dde0d942dad2be8fc5affb7455e9cb82498e
SHA512be7c15baf8d370f1fc5dac8e73c42e09fceb91916a29023c50df2fd7ef12aecc4d8de045f11ee2a566849795ef9e895845c7aefb6ddc24cccafb1bac80bf46f5