General
-
Target
2383a9414d20685ba100b1c103be00f6_JaffaCakes118
-
Size
767KB
-
Sample
241008-w7w17swcmc
-
MD5
2383a9414d20685ba100b1c103be00f6
-
SHA1
c7ae8d14ac7d0d69d10b5aa2fbbd7373acc86af8
-
SHA256
ae9e00afc3d70c56b36c68c8499b8fad834ef0382375a1814218985ecd9f8bda
-
SHA512
8d6ff916b638e086ab4f47ca817c35a7b8eaebfdb1838d79c132f14daa8c33c1d98adbe867902a625582325dd8e061a6b61d45075c5fc7415194de1a524bc82b
-
SSDEEP
12288:7df72iNeHK7zakGeVKwft+PtEZ2T5eWYrw+SbIkBpQc6stPRHKpbL8h:7dj1bDkEoTgq+YQc6Q5qpq
Static task
static1
Behavioral task
behavioral1
Sample
2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
owt8
globalstainlesssteel.com
bentleymichaels.com
svproductiveparents.com
vikinger.one
kiarabrunett.com
lakelandchiefs.com
kickzcity.com
ceroestrespma.com
torchfarmer.com
angelie26.com
pekinggardenonlineorder.com
brooklynrealtynow.com
makaroniwino.com
wiresncircuits.com
vwealth-archive.com
anfang1718.com
sahaconcierge.com
rctuition.com
premiercovidscreening.com
ryl3inc.com
kendallcorso.com
applianceversus.com
bpdszx.com
elmavans.com
seabridgexim.com
sexuallegends.com
suruchihirawat.com
alexisroseapperal.com
nakupmx.com
rentcallcenter.com
bosquefamily.com
jennyouseph.com
oszczedzanie.net
lrzhnsvl.icu
plansights.com
scaled.email
flowavalon.com
hadassahgt.com
guestsemails.com
bleuarmor.com
modul8sa.com
optionsvig.com
holisticbrews.com
doxyhand.com
rockingroles.com
carladessi.com
gustobolivia.com
afcerd.com
wzqp666.com
gerbangpengetahuan.com
veropatio.com
gzsycnc.com
louisbmartinez100th.com
bc8688.com
nuckelavee.net
amazon-t8.com
myvegasinsider.com
saltybonesservices.com
taylerstutoring.com
cureelements.com
sugamayurved.com
aquaticwayoflife.com
obsswapmeet.com
gariwala.net
bacha1.com
Targets
-
-
Target
2383a9414d20685ba100b1c103be00f6_JaffaCakes118
-
Size
767KB
-
MD5
2383a9414d20685ba100b1c103be00f6
-
SHA1
c7ae8d14ac7d0d69d10b5aa2fbbd7373acc86af8
-
SHA256
ae9e00afc3d70c56b36c68c8499b8fad834ef0382375a1814218985ecd9f8bda
-
SHA512
8d6ff916b638e086ab4f47ca817c35a7b8eaebfdb1838d79c132f14daa8c33c1d98adbe867902a625582325dd8e061a6b61d45075c5fc7415194de1a524bc82b
-
SSDEEP
12288:7df72iNeHK7zakGeVKwft+PtEZ2T5eWYrw+SbIkBpQc6stPRHKpbL8h:7dj1bDkEoTgq+YQc6Q5qpq
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1