Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe
-
Size
365KB
-
MD5
e300b0ea04a1c33f7b0ca2a924632d3c
-
SHA1
47ec6138765a54036ce46ddb900d4ceccfe6d698
-
SHA256
ec42d1761aba72e3789f1d11e744c46394c2929dfef85c8d6297d37a89057b83
-
SHA512
f746ea33cb60e2e811a8ecfcd62e3ca0f3073e67c895bb81c0a18eb3b30b19f73da6bd4dee9c303034763001e8b1645b7e12959950cacff3279a706614b72eac
-
SSDEEP
6144:hBplqXThHWJohGUzxQPlmzGhfeF/ohaNuuH1ay951GfWkP3yd+1rH8zGlzWdlJvE:FlNJoMUmPlmzGhm50oFTUWkv/HQX6
Malware Config
Extracted
formbook
3.9
s8y
jazminewphoto.com
luyansu.com
mastertouchusa.net
hengyuangcjx.com
happinessabscissa.online
kinderspielproject.com
namoloja.com
wattwatchers.energy
ambikaprabhu.online
280top.info
emailtoast.com
holoidayinn.com
usthadhotel.com
jilinhengjinyaoye.com
walden.land
huicbxw.com
zhiyidetrade.com
ykm365.com
whmc99.com
jamiecarbetta.com
intesacasa.com
nolieo.net
xqxds.com
africaheli.com
bdplaza.com
bishopadv.com
athinasailing.com
timpview.news
focus-ecommerce.com
kaffeemall.com
kingsofbaxter.com
assignmentasiantyper.com
wtt36.com
prhekv.men
brokenbirdcage.com
xn--vcsy46a6r3a1th.biz
js-no-tec.com
hotelsoverbooking.com
kanglaotou.com
jylavoie.com
onlinebhikhari.com
thuyhoangcoto.com
badonmar.com
popshotsphotography.com
perlengkapanelektronik.com
tcpsiz.men
michaelsdbablog.com
cheap-clothes-for-women.site
ahmadnasradin.mom
137137137.com
lyet.ltd
makemycircle.com
xovert.download
brooklynporsche.net
banksecorner.com
sake-shirts.com
softprint.biz
kopa.ltd
anastasiasfantasy.com
giftcardsforall.win
viwdfw.info
realityrevealed.info
markmackoart.com
minorperks.com
nyoxibwer.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/5048-12-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/5048-18-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpZAv = "C:\\Users\\Admin\\AppData\\Local\\SpZAvd\\SpZAvdNxd.hta" e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3248 set thread context of 5048 3248 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 90 PID 5048 set thread context of 3516 5048 InstallUtil.exe 56 PID 4416 set thread context of 3516 4416 netsh.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 5048 InstallUtil.exe 5048 InstallUtil.exe 5048 InstallUtil.exe 5048 InstallUtil.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe 4416 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3248 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 5048 InstallUtil.exe 5048 InstallUtil.exe 5048 InstallUtil.exe 4416 netsh.exe 4416 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5048 InstallUtil.exe Token: SeDebugPrivilege 4416 netsh.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3248 wrote to memory of 5048 3248 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 90 PID 3248 wrote to memory of 5048 3248 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 90 PID 3248 wrote to memory of 5048 3248 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 90 PID 3248 wrote to memory of 5048 3248 e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe 90 PID 3516 wrote to memory of 4416 3516 Explorer.EXE 91 PID 3516 wrote to memory of 4416 3516 Explorer.EXE 91 PID 3516 wrote to memory of 4416 3516 Explorer.EXE 91 PID 4416 wrote to memory of 1584 4416 netsh.exe 92 PID 4416 wrote to memory of 1584 4416 netsh.exe 92 PID 4416 wrote to memory of 1584 4416 netsh.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e300b0ea04a1c33f7b0ca2a924632d3c_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1584
-
-