Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe
-
Size
414KB
-
MD5
f3becd80be8779dfeb8ca5791f7ffb86
-
SHA1
91f03335ff735cef93edafc6748d354d08eabe87
-
SHA256
44a8227ccd3bd1fb5285b84d99282b199594457c73bdab74c4cbeb331e671618
-
SHA512
f508be9b45170e7669c69ab6ec4849ddb318ee8d9a0d3ffc906197747de67b94d4c32b8aecb383fee6ce49d7e364a07743c8e3a7ed6e91132219633d65661abb
-
SSDEEP
12288:5D+5/QYSTtPaFx06kmDfAbqt2gqZhXmpgZPa:AX8abxkml9D
Malware Config
Extracted
formbook
4.1
kvsz
hdlivesonlinetv24.com
illaheehillsseniorliving.com
wihong.com
christopher-cost.com
huayvipee.com
csdroped.xyz
relationsvivantes.com
xmcombohome.com
qingc2.com
sunsetcinemamusic.com
anotherheadache.com
connectlcv.com
unitermi.com
cugetarileunuisarman.com
agakegois.com
burnercouture.com
ambassador-holidays.com
schnarr-design.com
2013lang.com
httattoos.com
cleanhardinquiries.credit
jinduowei.com
despoticat.com
tclongke.com
medknizgka.com
mouowgoah.com
ehswholesale.com
sababa.club
facelift.pink
johnhall2020.com
superbahis62.com
erodea.com
dahaizhaofang.ltd
hiddenlighttattoo.com
michaelpte.com
easytradeoptions.com
jlnclub-hz.com
preciousmetals.supply
xn--9p4b887a.com
bigjbbq.com
twoamys.com
tor-one.com
freenfearlesscoaching.com
playmomknowsbest.com
maasiraq.com
michelon.solutions
shortpocketsmusic.com
pure-sonic.com
marilrealty.com
sillvoice.com
gawahrzinerbne.com
qsshop.net
globalmobilityinsights.com
psm-gen.com
stray-love.com
cjsweettreats.com
ulcforum.com
jlizf.com
guidemining.com
1440windingoakswest.com
mixedrealitycolabs.com
shealetics.com
11700.cloud
chazhentan.com
whealthypeople.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/220-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/220-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3596-28-0x0000000001240000-0x000000000126E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3492 set thread context of 220 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe 93 PID 220 set thread context of 3464 220 RegSvcs.exe 56 PID 3596 set thread context of 3464 3596 systray.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe 220 RegSvcs.exe 220 RegSvcs.exe 220 RegSvcs.exe 220 RegSvcs.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe 3596 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 220 RegSvcs.exe 220 RegSvcs.exe 220 RegSvcs.exe 3596 systray.exe 3596 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe Token: SeDebugPrivilege 220 RegSvcs.exe Token: SeDebugPrivilege 3596 systray.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3492 wrote to memory of 3084 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe 91 PID 3492 wrote to memory of 3084 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe 91 PID 3492 wrote to memory of 3084 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe 91 PID 3492 wrote to memory of 220 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe 93 PID 3492 wrote to memory of 220 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe 93 PID 3492 wrote to memory of 220 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe 93 PID 3492 wrote to memory of 220 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe 93 PID 3492 wrote to memory of 220 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe 93 PID 3492 wrote to memory of 220 3492 f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe 93 PID 3464 wrote to memory of 3596 3464 Explorer.EXE 94 PID 3464 wrote to memory of 3596 3464 Explorer.EXE 94 PID 3464 wrote to memory of 3596 3464 Explorer.EXE 94 PID 3596 wrote to memory of 2120 3596 systray.exe 95 PID 3596 wrote to memory of 2120 3596 systray.exe 95 PID 3596 wrote to memory of 2120 3596 systray.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3becd80be8779dfeb8ca5791f7ffb86_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HTufYRAKxBK" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB292.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53c1b3cd3d3548bb28b5fb81048bb289a
SHA1a60e23767ffb42e35f87812553e83eec7d3e0688
SHA25687c56e08b3236261fc6e990f93c5d2635a7943103b0cba278934991e1c4f732b
SHA51264ce3d10d801d5ed50cbd64416eafec6537620db6a00f555c8414da74436ee19c18811e67f4d0c76197ba475b965993d83f9d56786fa3ca5d4e2f7ad162f4b86