General
-
Target
c4df520118d965fb2ab0bde1dcc09ff3_JaffaCakes118
-
Size
730KB
-
Sample
240827-m6fhdsxeke
-
MD5
c4df520118d965fb2ab0bde1dcc09ff3
-
SHA1
ef4144775c594a5b327c07c303a05d80a02be2a6
-
SHA256
2e155653e55de265cfccc7878ca28f97a81a5aaa53ce70220d2480987dbe210b
-
SHA512
c556c0794fd1b8a7dcedce0e6c865e9a98314a262b982558d7e1af9872968f2173c2f73e7942d77210fbbcf43ba26902ad5658bb14d3b1b26bb80c895b5b4080
-
SSDEEP
12288:/OMm3F8MGhjSyUo7sIcnfDETcX8jf0NLOQL8Iunvmqe:3m1rGhj09IcfATw8jfMLXYnvml
Static task
static1
Behavioral task
behavioral1
Sample
c4df520118d965fb2ab0bde1dcc09ff3_JaffaCakes118.rtf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c4df520118d965fb2ab0bde1dcc09ff3_JaffaCakes118.rtf
Resource
win10v2004-20240802-en
Malware Config
Extracted
formbook
3.8
ch52
olyzee.com
fulguropop.com
oceancountybankruptcylawyer.com
rmrwoods.com
jiegenghualang.com
strongshopping.net
bestifwest.com
ruggedcrossmusic.net
sveja.gmbh
smoothrepairs.info
viemmaotinhhoan.com
thebalancedlifecenter.com
863bifa.com
waldospost.com
tripsinpano.com
usvxhr.loan
sibillaonceuponatimeisnow.com
yodatironil.com
ib-habibmetro.com
dulcescreativos.com
impetusengineering.com
btfwl.com
wwwjinsha167.com
phyto-booster.info
microfficeproducts.net
rsmanager.net
zacapausa.net
diyazaishengkeli.com
xn--tck9cucl1199f.biz
97sharing.com
marinesporteu.com
nzxym.com
hoteltunis.com
alkalinekangenwatermachine.com
qingliucaishang.com
organizeddestruction.com
weifanghanbang.com
packyourtrash.com
cold-video.com
flirt-u.info
habae.com
kevin-s-hill.com
chhataktraders.com
asiaimpex.info
mobilepcsoftwares.com
grandmajsplace.net
tribe-talk.com
450morningstar.com
gupufo73.party
nuanceandco.com
xn--gmq7a201d37tiv9a.biz
mapraportmk.com
jabaso41.win
adultmodelwork.com
elnativodeticha.com
deaducksnhoundogs.com
wwwy6455.com
homecontrolsolutions.net
tristanmackayevents.com
news3078.photography
cime.ltd
acilverikurtarma.info
moncriefcomputers.com
adelinas.restaurant
erimokate.com
Targets
-
-
Target
c4df520118d965fb2ab0bde1dcc09ff3_JaffaCakes118
-
Size
730KB
-
MD5
c4df520118d965fb2ab0bde1dcc09ff3
-
SHA1
ef4144775c594a5b327c07c303a05d80a02be2a6
-
SHA256
2e155653e55de265cfccc7878ca28f97a81a5aaa53ce70220d2480987dbe210b
-
SHA512
c556c0794fd1b8a7dcedce0e6c865e9a98314a262b982558d7e1af9872968f2173c2f73e7942d77210fbbcf43ba26902ad5658bb14d3b1b26bb80c895b5b4080
-
SSDEEP
12288:/OMm3F8MGhjSyUo7sIcnfDETcX8jf0NLOQL8Iunvmqe:3m1rGhj09IcfATw8jfMLXYnvml
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1