Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
c064ec37ffd4521397a436a9d0c3da18
-
SHA1
03ba9be491d49752464ffa0755f0d8926e1925e7
-
SHA256
a308003882167974d1a1f6334f0f9ee1599c50d33ec2883c856de84bf82365f4
-
SHA512
2186f2f8f28efdde84d196468b00f5df27417b65a10ba6589ee0e57d30ffef121ec04973db8ffc7d6ec935e8bdcf0a98d72cad057f131e6caf7c7455d72379ba
-
SSDEEP
24576:f9aok2Jbtfcp5l3E5zXVHjx9NMezB3xmSj:f9aSho45xDvZh
Malware Config
Extracted
formbook
3.9
an
setzesegel.com
freeyrself.com
searchshoppingonline.com
tv16282.info
unitedtur.com
168jlb.com
blockee.info
ryd5.com
kucun108.com
castcmi.red
ufc202.info
goldendawnequipment.com
anlatacaklarimvar.com
szgty.info
realtorlubbock.com
digitalumsetzbar.com
buy9voltblaster.com
naughtytingz.com
phstructuredwater.com
energettic.download
czhb666.com
gestures-in-urban-space.com
stpetevapestore.com
nativenotes.net
jx1nine.loan
resumecommandcenter.com
dropshippingchat.com
totalfreedomzone.info
sojoonghan.com
cpan8.com
lantianruib.com
thetipplebox.com
096586.com
gratitudenation.com
orthodontistwoollahra.com
wigzem.men
birgitweingarten.com
shianlo.com
mobixcx.com
quantifiedworkplace.com
584ljo.info
allthingsfencingbg.com
zghylights.ltd
iscqc.com
mountshasta.solutions
lvica.info
fotowrap.com
mapleskateboard.com
xn--910bp7b04frqaj3ejx6cumd.com
vegg.ltd
xn--efvy07c.com
110468.info
matchdou.com
corrierimt.com
mentalhealthinnovators.com
uemwede.com
digicom.cloud
tamolendo.com
xiaofengsheji.com
inspiredmoneyonline.com
551642.top
ptsmith.com
fastmovertooluk.com
gaertnerremodeling.com
skylod.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/8-6-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/8-12-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 856 set thread context of 8 856 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 98 PID 8 set thread context of 3396 8 diskperf.exe 55 PID 4700 set thread context of 3396 4700 svchost.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 8 diskperf.exe 8 diskperf.exe 8 diskperf.exe 8 diskperf.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 8 diskperf.exe 8 diskperf.exe 8 diskperf.exe 4700 svchost.exe 4700 svchost.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 8 diskperf.exe Token: SeDebugPrivilege 4700 svchost.exe Token: SeShutdownPrivilege 3396 Explorer.EXE Token: SeCreatePagefilePrivilege 3396 Explorer.EXE Token: SeShutdownPrivilege 3396 Explorer.EXE Token: SeCreatePagefilePrivilege 3396 Explorer.EXE Token: SeShutdownPrivilege 3396 Explorer.EXE Token: SeCreatePagefilePrivilege 3396 Explorer.EXE Token: SeShutdownPrivilege 3396 Explorer.EXE Token: SeCreatePagefilePrivilege 3396 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3396 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 856 wrote to memory of 8 856 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 98 PID 856 wrote to memory of 8 856 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 98 PID 856 wrote to memory of 8 856 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 98 PID 856 wrote to memory of 8 856 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 98 PID 856 wrote to memory of 8 856 c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe 98 PID 3396 wrote to memory of 4700 3396 Explorer.EXE 100 PID 3396 wrote to memory of 4700 3396 Explorer.EXE 100 PID 3396 wrote to memory of 4700 3396 Explorer.EXE 100 PID 4700 wrote to memory of 620 4700 svchost.exe 101 PID 4700 wrote to memory of 620 4700 svchost.exe 101 PID 4700 wrote to memory of 620 4700 svchost.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3656
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\diskperf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:620
-
-