Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe
-
Size
397KB
-
MD5
d7dd59c45d9c7d647d28b83412e9e1bb
-
SHA1
1bfd4f114eb6e9cad55206056fecf9da0cba7bdc
-
SHA256
939ca5032b5fc17d00bb9be7b7cb4bef70691a76ceebf9777b58e9e9845a05d6
-
SHA512
1c9772f686d149d5e19ace0779681c3f64db051b43db559b74b3e05013e8cc71ef9451df3016f87a54654c8ea3c63498d9f3f3987b0e63f3f71a940521689172
-
SSDEEP
6144:Di3fBD/vecMMW3b9A53IvHlouxcAG42uZB:ONPkEiHegnT
Malware Config
Extracted
formbook
3.9
h321
getweddinginsurance.com
easterpalette.com
pkitinfo.com
rendaextrabr.com
woodlandmanorapartments.com
tv16091.info
kput.ltd
thutrangshop.com
worldschoolhelper.com
erschaffe-dein-leben-neu.com
svenskamarknaden.com
neterka.com
newagrarianrevival.com
bomeilvye.com
little789.top
datisfile.com
funwithgravity.com
dynatestxplode.com
thepetblarneystone.net
riffstick.com
minemexuhc.win
jsinternetcafe.com
denverindians.com
oblexamplee.com
singaporetutorjobs.com
dpdp7942.com
drakmod.com
yunnanbox.com
minesecrets.com
sitongwangda.com
wholisticeducationalcoach.com
youcanownagain.info
pen-studios.com
supremeroofingcanada.com
dynamicintlogistics.com
salonanjing.com
01666e.com
jessoh.com
fresherouse.com
petitfresh.com
xjk666.com
tiffinjojo.com
jointhepreservolution.com
fidelisakoh.com
allrightagency.com
itshemportant.com
alikucuksari.com
mystergamer.com
parmalim.com
squxd.info
imhyeran.com
lomalan.com
nepalchitra.com
alfadesignlab.com
melanietarynlieberman.net
coinmalta.net
fogazzooutdoorkitchens.com
suitofbullets.com
cdegafba.com
craftcafegiftsandgardens.com
roundsweet.win
alquilerautolandia.com
camplovapup.com
alexmcfarlin.com
sukfat.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3688-13-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3688 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1152 set thread context of 3688 1152 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe 99 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3688 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe 3688 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1152 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1152 wrote to memory of 4284 1152 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe 95 PID 1152 wrote to memory of 4284 1152 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe 95 PID 1152 wrote to memory of 4284 1152 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe 95 PID 1152 wrote to memory of 3688 1152 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe 99 PID 1152 wrote to memory of 3688 1152 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe 99 PID 1152 wrote to memory of 3688 1152 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe 99 PID 1152 wrote to memory of 3688 1152 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe 99 PID 1152 wrote to memory of 3688 1152 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe 99 PID 1152 wrote to memory of 3688 1152 d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe:Zone.Identifier"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d7dd59c45d9c7d647d28b83412e9e1bb_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5d7dd59c45d9c7d647d28b83412e9e1bb
SHA11bfd4f114eb6e9cad55206056fecf9da0cba7bdc
SHA256939ca5032b5fc17d00bb9be7b7cb4bef70691a76ceebf9777b58e9e9845a05d6
SHA5121c9772f686d149d5e19ace0779681c3f64db051b43db559b74b3e05013e8cc71ef9451df3016f87a54654c8ea3c63498d9f3f3987b0e63f3f71a940521689172