Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe
-
Size
746KB
-
MD5
cdd74989ccca9c104e0239199f354397
-
SHA1
129d9eae5e82d63cc19c6dfef74cd9d8c903fcf8
-
SHA256
0c68bedf273c54fb11df082f5ba6db85fd819cf12f9d40a0a6a683d859315548
-
SHA512
1a8a59e17584164f2a8ec913b65a70219b220e149c209aeccce47bf31a3d56faaa12147e3162045045c3c78437ff244389e065001ef963f8c3424cc4b7089c04
-
SSDEEP
12288:M9mtiK5oGSjc2YADH/7sG1Zhvqyih/sFOSwHfABaqzSqf2Qq5GWS0gOhk:0+FoGFcf7/vchUESDEZQq5GWXp
Malware Config
Extracted
formbook
4.1
vd9n
theunwrappedcollective.com
seckj-ic.com
tyresandover.com
thetrophyworld.com
fonggrconstruction.com
hopiproject.com
sktitle.com
charlotteobscurer.com
qjuhe.com
girlzglitter.com
createmylawn.com
hempcbgpill.com
zzdfdzkj.com
shreehariessential.com
226sm.com
getcupscall.com
neuralviolin.com
sanskaar.life
xn--fhqrm54yyukopc.com
togetherx4fantasy5star.today
buyonlinesaree.com
percyshandman.site
hatchethangout.com
rugpat.com
zen-gizmo.com
vipmomali.com
lacerasavall.cat
aqueouso.com
mkolgems.com
sevenhundredseventysix.fund
fotografhannaneret.com
mitravy.com
bmtrans.net
linterpreting.com
izquay.com
sawaturkey.com
marche-maman.com
eemygf.com
animenovel.com
travelssimply.com
montecitobutterfly.com
volebahis.com
daniela.red
ramseyedk12.com
leyterealestate.info
patriotstrong.net
vkgcrew.com
nadhiradeebaazkiya.online
hotelcarre.com
myfabulouscollection.com
stellantis-luxury-rent.com
hn2020.xyz
emilyscopes.com
lotosouq.com
lovecord.date
stconstant.online
volkite-culverin.net
allwaysautism.com
sheisnatashasimone.com
sepantaceram.com
ishopgrady.com
lifestorycard.com
sexybbwavailable.website
domainbaycapital.com
constructioncleanup.pro
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2784-19-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2784-24-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1392 set thread context of 2784 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 106 PID 2784 set thread context of 3444 2784 RegSvcs.exe 56 PID 4828 set thread context of 3444 4828 raserver.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 2784 RegSvcs.exe 2784 RegSvcs.exe 2784 RegSvcs.exe 2784 RegSvcs.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe 4828 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2784 RegSvcs.exe 2784 RegSvcs.exe 2784 RegSvcs.exe 4828 raserver.exe 4828 raserver.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe Token: SeDebugPrivilege 2784 RegSvcs.exe Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeDebugPrivilege 4828 raserver.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3444 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1068 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 103 PID 1392 wrote to memory of 1068 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 103 PID 1392 wrote to memory of 1068 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 103 PID 1392 wrote to memory of 4400 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 105 PID 1392 wrote to memory of 4400 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 105 PID 1392 wrote to memory of 4400 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 105 PID 1392 wrote to memory of 2784 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 106 PID 1392 wrote to memory of 2784 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 106 PID 1392 wrote to memory of 2784 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 106 PID 1392 wrote to memory of 2784 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 106 PID 1392 wrote to memory of 2784 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 106 PID 1392 wrote to memory of 2784 1392 cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe 106 PID 3444 wrote to memory of 4828 3444 Explorer.EXE 107 PID 3444 wrote to memory of 4828 3444 Explorer.EXE 107 PID 3444 wrote to memory of 4828 3444 Explorer.EXE 107 PID 4828 wrote to memory of 2228 4828 raserver.exe 108 PID 4828 wrote to memory of 2228 4828 raserver.exe 108 PID 4828 wrote to memory of 2228 4828 raserver.exe 108
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cdd74989ccca9c104e0239199f354397_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LTQZnFi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp877B.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:4400
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-