Analysis
-
max time kernel
97s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe
-
Size
909KB
-
MD5
0c2b1eeac25a832ce077154cf58b8ffd
-
SHA1
b6c42b104518cd63b967edbffe1c25187fa7d9f3
-
SHA256
f23a4109022b07435c73f2f5e29770e87cdda4ef2a77c8b978a2b089399ea903
-
SHA512
93622b34856b3aaf16967fac2dd53f388ebf1de5096a8b30a5a19ba76ec7f907b72aa80d9f6eb498f6162cff1f8d5cb8f5f532c0d745af0f6f761ac350d7233a
-
SSDEEP
12288:taWK2n3qGaNHEyC9/oR9gy5FHK7zj40FvGFrE4trCdBdWSQZ3+ybEwcjpg+OzRV6:tnKePp9AR95yX40F8rC1K1Fc9QVixIO
Malware Config
Extracted
formbook
4.1
o4ms
fishingboatpub.com
trebor72.com
qualitycleanaustralia.com
amphilykenyx.com
jayte90.net
alveegrace.com
le-fleursoleil.com
volumoffer.com
businessbookwriters.com
alpin-art.com
firsttastetogo.com
catofc.com
ref-290.com
sbo2008.com
fortlauderdaleelevators.com
shanghaiyalian.com
majestybags.com
afcerd.com
myceliated.com
ls0a.com
chautauquapistolpermit.com
cq1937.com
riafellowship.com
sjzlyk120.com
onlinerebatemall.com
bjlmzmd.com
services-neetflix-info.info
khaapa.com
thehgboutique.com
iconndigital.com
ninjavendas.com
zeonyej.icu
iddqdtrk.com
taoy360.info
conanagent.icu
mobileflirting.online
lorrainelevis.com
bakerrepublic.com
tfi50.net
mildlobr.com
turnkeypet.com
instarmall.com
contilnetnoticias.website
symbiocrm.com
earn074.com
swapf.com
daveydavisphotography.com
notes2nobody.com
pensje.net
nanoplastiakopoma.com
inlandempiresublease.com
donaldjtryump.com
secondinningseva.com
zumohub.xyz
torbiedesigns.com
koastedco.com
lifestyleeve.com
purposepalacevenue.com
risk-managements.com
doluhediye.com
revolutionarylightworkers.com
smithridge.net
share-store.net
jastalks.com
nocodehost.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3940-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3292 set thread context of 3940 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4420 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 3940 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 3940 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3292 wrote to memory of 4420 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 91 PID 3292 wrote to memory of 4420 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 91 PID 3292 wrote to memory of 4420 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 91 PID 3292 wrote to memory of 4312 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 93 PID 3292 wrote to memory of 4312 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 93 PID 3292 wrote to memory of 4312 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 93 PID 3292 wrote to memory of 3940 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 94 PID 3292 wrote to memory of 3940 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 94 PID 3292 wrote to memory of 3940 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 94 PID 3292 wrote to memory of 3940 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 94 PID 3292 wrote to memory of 3940 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 94 PID 3292 wrote to memory of 3940 3292 0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KFwXXDtxJrwJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4F92.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"2⤵PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d25647ade8c9df2985b5f071fa98fad0
SHA14db8b77becb24c1ff5485eb082fbe1541e54c307
SHA256d98550dddfe85127fc1d9f5912b410b1073dc3b72e695ca6fb0ee23393f1c8ae
SHA51222ae375944dc15d0f81bde81b30b7b71b046fe4ad26b5729b6bfee10704bc6fe39fd8a9b51ca353cdc49931fa904090cf9d4c8046952f78302e826154cfa1e1d