Analysis
-
max time kernel
90s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 09:46
Static task
static1
Behavioral task
behavioral1
Sample
f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe
-
Size
964KB
-
MD5
f817bc5a13f0f7ffe8652f86dc0ce55f
-
SHA1
0f2d30796f411da74a3af083966bad88f4a3a326
-
SHA256
6d4e4528a1cb3af656e84e74dab6731c2d80f2e57f95ca865ba3a0628207a673
-
SHA512
5d09e4adcdf7a2a73972433b89021e702e08882ada4a536fbdb92c8fa492193822fcd8655003a2dfdf38840ebdba065b9f12cb6a3df5deab5ca2dc6c9fa533c2
-
SSDEEP
12288:q+6L7SIHNcIPaYJPaSiMae7TT4JwH/CW4yaWJSt:qZXbtc8aYJySiiPkSfC+f
Malware Config
Extracted
formbook
4.1
kbc
ross76.com
modabyboutique.com
zenabode.store
peakorgmush.net
superchargelab.com
mumaniu.net
18costleyst.com
moreroomy.com
creativecardsnappanee.com
jameshamiltonphoto.com
amimania.com
ahaihealing.com
thecopy.coach
caishen2587.com
bigdickquick.com
suojincn.com
2020rl.com
jointbah.com
teddingtonstudios.com
javre.club
staytonhigh.com
werunthebases.net
cuoisangkhoai.com
tamikastevenson.com
deintuning.com
lookingforsolution.net
elmejorsetup.com
aprobet43.xyz
qbluebaylivewd.com
orbitnest.com
notitlement.net
fordagelijkse-aanbiedingen.com
e-lsolar.com
soulstartuphub.com
jeetinternationalgroup.com
juduojiapinpdd.com
obellegrande.com
wordsmithmridgandha.com
bumpgrandma.com
jordanmatrimony.com
sansarhome.com
xn--hurryet-bza.com
skatinggoosefarm.com
10erres.com
cleopatrasormus.com
vidacomdeus.life
yeasuc.com
soleymaniha.com
assistedlivingarcadia.com
grouphall.net
kinect.solar
accidentify.com
jaya.asia
pwrenn.com
rainbowhealingandwellness.com
streminglive24.xyz
fiercegracecounseling.com
7ba3.com
cherryhillimmigrationlawyer.com
melsquirkycorner.com
bihartaxi.com
crossfitverstas.com
dungouquan.com
homeownerdefenders.com
avonvalleycollege.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4972-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3260 set thread context of 4972 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 4972 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 4972 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3260 wrote to memory of 3024 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 93 PID 3260 wrote to memory of 3024 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 93 PID 3260 wrote to memory of 3024 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 93 PID 3260 wrote to memory of 4972 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 95 PID 3260 wrote to memory of 4972 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 95 PID 3260 wrote to memory of 4972 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 95 PID 3260 wrote to memory of 4972 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 95 PID 3260 wrote to memory of 4972 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 95 PID 3260 wrote to memory of 4972 3260 f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CcbnPmJmAZnQJq" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCF90.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53b0de825be75211705293ce9fe380732
SHA1f477ba4b4be99cba2747472213419530d505d8be
SHA256f906cd8925fcae6b6f5124339667b04c0d87b4a1a6cef8877eae54dff352f14d
SHA5126a9c1c3e1cfb63bc4eabb0e9b7cd17086d26ba171ac7ae1c4c247ec013520a14a3d1923c77046f638bcb40fe4270b8ab0bee88bf0c05696b035c1740cf9a0682