Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe
-
Size
958KB
-
MD5
c8fda80e652d365bc5ceb4e065c51ee3
-
SHA1
c3e984e1e8a7421c17e3ecd3a4e3a4ba183ae562
-
SHA256
4b8ad4a9d84c014358222a91b7a8d3b7f6b3a5853750d84e1d1e677a5bc9e9ff
-
SHA512
edf9e0ca4d76dfe023a309e68ad06d25e960f6173b07d132908914a165f6f32b12280c0d400f86637594f3d28317170cfce134d0154346a4a6376a27acb9c50a
-
SSDEEP
12288:d/UQS1E+wSE1vfy2dJzOP9vExIH0h1zCShca7Av7Q292QOdGHRp69:dewSWfySzOPux0keSG62Dxz69
Malware Config
Extracted
formbook
3.9
ca
jphmo.com
planbmx.com
jcygtpu.com
mindpathvideo.net
napavalleymysore.com
bitkanji.com
thecologne.zone
getreadyherenow6.info
cybersecfirst.com
celtflowers.com
zfk3.net
thecheapest.review
1b4tenhell.men
padaria2irmaos.com
azimitrdg.com
oldschoolnate.com
customhighperformance.com
classicrockandgems.com
marvinreynoso.com
stuffnsit.com
dermady.party
modulareng.com
amalgamatemediagroup.com
1v5twothere.loan
tesoroitlay.com
aerpie.com
business-job-tipps.info
offbaaz.com
zero-frais-immo-france.com
thechronicginger.com
sjsedphh.com
hvbet5188.com
spitcrack.com
367vision.com
permanentmakeupagency.com
hankoooktirerebates.com
topberita.news
jianzhuxuexiao.com
inomedikal.com
freakyteelit.com
patraspittyproject.com
pet-blowing-machine.com
tugi.ltd
xn--h1abegilggc.com
spoiledheart.com
cheiroetempero.com
patzcuarofurniture.com
xn--wfr527a6no5sw8da31v.com
hdedg.com
cantinhodasartestattoo.com
yfggjnxma.com
fencingderby.com
quackattackel.com
hcdn.top
mieswills.com
glowsole.com
abettercayman.site
webportal.store
quwojiaba.com
penulisindonesia.com
mybottle.group
applescan.info
fabrique.online
swissgearkz.com
crypoz.com
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload 5 IoCs
resource yara_rule behavioral2/memory/1696-4-0x0000000005980000-0x00000000059AA000-memory.dmp formbook behavioral2/memory/2124-9-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/2124-12-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/64-22-0x0000000001100000-0x000000000112A000-memory.dmp formbook behavioral2/memory/64-27-0x0000000001100000-0x000000000112A000-memory.dmp formbook -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Q2U0M6HH = "C:\\Program Files (x86)\\Ym658\\wv18zgfid.exe" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1696 set thread context of 2124 1696 c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe 86 PID 2124 set thread context of 3452 2124 vbc.exe 56 PID 2124 set thread context of 3452 2124 vbc.exe 56 PID 64 set thread context of 3452 64 msiexec.exe 56 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Ym658\wv18zgfid.exe msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1696 c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe 1696 c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe 2124 vbc.exe 2124 vbc.exe 2124 vbc.exe 2124 vbc.exe 2124 vbc.exe 2124 vbc.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe 64 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2124 vbc.exe 2124 vbc.exe 2124 vbc.exe 2124 vbc.exe 64 msiexec.exe 64 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1696 c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe Token: SeDebugPrivilege 2124 vbc.exe Token: SeDebugPrivilege 64 msiexec.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3452 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2124 1696 c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe 86 PID 1696 wrote to memory of 2124 1696 c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe 86 PID 1696 wrote to memory of 2124 1696 c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe 86 PID 1696 wrote to memory of 2124 1696 c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe 86 PID 1696 wrote to memory of 2124 1696 c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe 86 PID 1696 wrote to memory of 2124 1696 c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe 86 PID 3452 wrote to memory of 64 3452 Explorer.EXE 92 PID 3452 wrote to memory of 64 3452 Explorer.EXE 92 PID 3452 wrote to memory of 64 3452 Explorer.EXE 92 PID 64 wrote to memory of 2308 64 msiexec.exe 94 PID 64 wrote to memory of 2308 64 msiexec.exe 94 PID 64 wrote to memory of 2308 64 msiexec.exe 94 PID 64 wrote to memory of 4888 64 msiexec.exe 109 PID 64 wrote to memory of 4888 64 msiexec.exe 109 PID 64 wrote to memory of 4888 64 msiexec.exe 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵
- System Location Discovery: System Language Discovery
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
84KB
MD56a846b0fd21066712d37d711bf7e4336
SHA1ed14c219640531d332f25e401ccf4cc44910ebc2
SHA256cebcc3fed2e0b04ee181c670beb620b0bc069e6953ff22831c51c0f1f33437a0
SHA5123d9121c170601e1a9f6d012e77297b4b8595a3f221b75dca7b10cdd87016e540678570811451aad697c3c8879fb8879591266e7f3276775edfad5bb241635822
-
Filesize
38B
MD54aadf49fed30e4c9b3fe4a3dd6445ebe
SHA11e332822167c6f351b99615eada2c30a538ff037
SHA25675034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56
SHA512eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945
-
Filesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
Filesize
872B
MD5bbc41c78bae6c71e63cb544a6a284d94
SHA133f2c1d9fa0e9c99b80bc2500621e95af38b1f9a
SHA256ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb
SHA5120aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4