Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 19:50
Static task
static1
Behavioral task
behavioral1
Sample
0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe
-
Size
946KB
-
MD5
0c3c3c868a9ee2d1c6c14f9fafd757a1
-
SHA1
816b112e6027f9d1caec76f78231bd24f6185094
-
SHA256
df6ade5c4e7c4f0e82aca32d744b6f8762d2dd82a98b7bda97e42748d488a661
-
SHA512
e71f53fa6a4b2d0c36b7b9d110988e47c11bee51ed33dfbcb1368adc34f10a8e17112cd286f88da637075dc37e1946151edbebb20012dedbb2487e6f18848f2c
-
SSDEEP
24576:B2wFJMNjRquEyu6nXj4UCmPUUcQfbhvj5CxRT:UwFehkuEGnTVJs9qJ
Malware Config
Extracted
formbook
4.1
vd9n
theunwrappedcollective.com
seckj-ic.com
tyresandover.com
thetrophyworld.com
fonggrconstruction.com
hopiproject.com
sktitle.com
charlotteobscurer.com
qjuhe.com
girlzglitter.com
createmylawn.com
hempcbgpill.com
zzdfdzkj.com
shreehariessential.com
226sm.com
getcupscall.com
neuralviolin.com
sanskaar.life
xn--fhqrm54yyukopc.com
togetherx4fantasy5star.today
buyonlinesaree.com
percyshandman.site
hatchethangout.com
rugpat.com
zen-gizmo.com
vipmomali.com
lacerasavall.cat
aqueouso.com
mkolgems.com
sevenhundredseventysix.fund
fotografhannaneret.com
mitravy.com
bmtrans.net
linterpreting.com
izquay.com
sawaturkey.com
marche-maman.com
eemygf.com
animenovel.com
travelssimply.com
montecitobutterfly.com
volebahis.com
daniela.red
ramseyedk12.com
leyterealestate.info
patriotstrong.net
vkgcrew.com
nadhiradeebaazkiya.online
hotelcarre.com
myfabulouscollection.com
stellantis-luxury-rent.com
hn2020.xyz
emilyscopes.com
lotosouq.com
lovecord.date
stconstant.online
volkite-culverin.net
allwaysautism.com
sheisnatashasimone.com
sepantaceram.com
ishopgrady.com
lifestorycard.com
sexybbwavailable.website
domainbaycapital.com
constructioncleanup.pro
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2904-19-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2904-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1140 set thread context of 2904 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 31 PID 2904 set thread context of 1240 2904 RegSvcs.exe 20 PID 2648 set thread context of 1240 2648 msiexec.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2160 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2904 RegSvcs.exe 2904 RegSvcs.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe 2648 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2904 RegSvcs.exe 2904 RegSvcs.exe 2904 RegSvcs.exe 2648 msiexec.exe 2648 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2904 RegSvcs.exe Token: SeDebugPrivilege 2648 msiexec.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2160 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 29 PID 1140 wrote to memory of 2160 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 29 PID 1140 wrote to memory of 2160 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 29 PID 1140 wrote to memory of 2160 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 29 PID 1140 wrote to memory of 2904 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 31 PID 1140 wrote to memory of 2904 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 31 PID 1140 wrote to memory of 2904 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 31 PID 1140 wrote to memory of 2904 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 31 PID 1140 wrote to memory of 2904 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 31 PID 1140 wrote to memory of 2904 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 31 PID 1140 wrote to memory of 2904 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 31 PID 1140 wrote to memory of 2904 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 31 PID 1140 wrote to memory of 2904 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 31 PID 1140 wrote to memory of 2904 1140 0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe 31 PID 1240 wrote to memory of 2648 1240 Explorer.EXE 32 PID 1240 wrote to memory of 2648 1240 Explorer.EXE 32 PID 1240 wrote to memory of 2648 1240 Explorer.EXE 32 PID 1240 wrote to memory of 2648 1240 Explorer.EXE 32 PID 1240 wrote to memory of 2648 1240 Explorer.EXE 32 PID 1240 wrote to memory of 2648 1240 Explorer.EXE 32 PID 1240 wrote to memory of 2648 1240 Explorer.EXE 32 PID 2648 wrote to memory of 3020 2648 msiexec.exe 33 PID 2648 wrote to memory of 3020 2648 msiexec.exe 33 PID 2648 wrote to memory of 3020 2648 msiexec.exe 33 PID 2648 wrote to memory of 3020 2648 msiexec.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c3c3c868a9ee2d1c6c14f9fafd757a1_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bIcyzp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5541.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e95b48e20d092776b55cb7790c6b8bc1
SHA1e7dfa1724fd8df1bd9817f62680066f2423b2c31
SHA256c6b18f8cc56ba659ab0b54955b59bc5295397bba6ba6ef0d2d89a32df92105a4
SHA5126c5586a0713d0cda8067ce1ebac229da0202b2d931dddeb59a7303f81cffb2bd07cfbfa3d267599b1a28b5b13187f83923064a6249ff8fed4432ccdac1207be7