Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe
-
Size
909KB
-
MD5
0c2b1eeac25a832ce077154cf58b8ffd
-
SHA1
b6c42b104518cd63b967edbffe1c25187fa7d9f3
-
SHA256
f23a4109022b07435c73f2f5e29770e87cdda4ef2a77c8b978a2b089399ea903
-
SHA512
93622b34856b3aaf16967fac2dd53f388ebf1de5096a8b30a5a19ba76ec7f907b72aa80d9f6eb498f6162cff1f8d5cb8f5f532c0d745af0f6f761ac350d7233a
-
SSDEEP
12288:taWK2n3qGaNHEyC9/oR9gy5FHK7zj40FvGFrE4trCdBdWSQZ3+ybEwcjpg+OzRV6:tnKePp9AR95yX40F8rC1K1Fc9QVixIO
Malware Config
Extracted
formbook
4.1
o4ms
fishingboatpub.com
trebor72.com
qualitycleanaustralia.com
amphilykenyx.com
jayte90.net
alveegrace.com
le-fleursoleil.com
volumoffer.com
businessbookwriters.com
alpin-art.com
firsttastetogo.com
catofc.com
ref-290.com
sbo2008.com
fortlauderdaleelevators.com
shanghaiyalian.com
majestybags.com
afcerd.com
myceliated.com
ls0a.com
chautauquapistolpermit.com
cq1937.com
riafellowship.com
sjzlyk120.com
onlinerebatemall.com
bjlmzmd.com
services-neetflix-info.info
khaapa.com
thehgboutique.com
iconndigital.com
ninjavendas.com
zeonyej.icu
iddqdtrk.com
taoy360.info
conanagent.icu
mobileflirting.online
lorrainelevis.com
bakerrepublic.com
tfi50.net
mildlobr.com
turnkeypet.com
instarmall.com
contilnetnoticias.website
symbiocrm.com
earn074.com
swapf.com
daveydavisphotography.com
notes2nobody.com
pensje.net
nanoplastiakopoma.com
inlandempiresublease.com
donaldjtryump.com
secondinningseva.com
zumohub.xyz
torbiedesigns.com
koastedco.com
lifestyleeve.com
purposepalacevenue.com
risk-managements.com
doluhediye.com
revolutionarylightworkers.com
smithridge.net
share-store.net
jastalks.com
nocodehost.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2252-20-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2252-23-0x0000000000A10000-0x0000000000D13000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2508 set thread context of 2252 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2744 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2252 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2744 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2744 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2744 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2744 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2252 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 33 PID 2508 wrote to memory of 2252 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 33 PID 2508 wrote to memory of 2252 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 33 PID 2508 wrote to memory of 2252 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 33 PID 2508 wrote to memory of 2252 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 33 PID 2508 wrote to memory of 2252 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 33 PID 2508 wrote to memory of 2252 2508 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KFwXXDtxJrwJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp62E8.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD539c1a83d6afaff9571a52771cfd7ee28
SHA12abc4b704966449532a6eed2b688882ae2724782
SHA256c1e26eec3552a058015b231193a2c11b9becbb454b0a177f59b578559471b9b2
SHA512d1cce2fa573c3766871753be90b9eb73abc6acaaa3749acc22dafc8fee9401acdd0c6032db626c4ab08056282930c8366f1cc82e8e20f719f9b83134dc88cc61