Analysis
-
max time kernel
50s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe
-
Size
767KB
-
MD5
2383a9414d20685ba100b1c103be00f6
-
SHA1
c7ae8d14ac7d0d69d10b5aa2fbbd7373acc86af8
-
SHA256
ae9e00afc3d70c56b36c68c8499b8fad834ef0382375a1814218985ecd9f8bda
-
SHA512
8d6ff916b638e086ab4f47ca817c35a7b8eaebfdb1838d79c132f14daa8c33c1d98adbe867902a625582325dd8e061a6b61d45075c5fc7415194de1a524bc82b
-
SSDEEP
12288:7df72iNeHK7zakGeVKwft+PtEZ2T5eWYrw+SbIkBpQc6stPRHKpbL8h:7dj1bDkEoTgq+YQc6Q5qpq
Malware Config
Extracted
formbook
4.1
owt8
globalstainlesssteel.com
bentleymichaels.com
svproductiveparents.com
vikinger.one
kiarabrunett.com
lakelandchiefs.com
kickzcity.com
ceroestrespma.com
torchfarmer.com
angelie26.com
pekinggardenonlineorder.com
brooklynrealtynow.com
makaroniwino.com
wiresncircuits.com
vwealth-archive.com
anfang1718.com
sahaconcierge.com
rctuition.com
premiercovidscreening.com
ryl3inc.com
kendallcorso.com
applianceversus.com
bpdszx.com
elmavans.com
seabridgexim.com
sexuallegends.com
suruchihirawat.com
alexisroseapperal.com
nakupmx.com
rentcallcenter.com
bosquefamily.com
jennyouseph.com
oszczedzanie.net
lrzhnsvl.icu
plansights.com
scaled.email
flowavalon.com
hadassahgt.com
guestsemails.com
bleuarmor.com
modul8sa.com
optionsvig.com
holisticbrews.com
doxyhand.com
rockingroles.com
carladessi.com
gustobolivia.com
afcerd.com
wzqp666.com
gerbangpengetahuan.com
veropatio.com
gzsycnc.com
louisbmartinez100th.com
bc8688.com
nuckelavee.net
amazon-t8.com
myvegasinsider.com
saltybonesservices.com
taylerstutoring.com
cureelements.com
sugamayurved.com
aquaticwayoflife.com
obsswapmeet.com
gariwala.net
bacha1.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1692-25-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2604 powershell.exe 2876 powershell.exe 1608 powershell.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1720 set thread context of 1692 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2600 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2876 powershell.exe 1608 powershell.exe 1692 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 2604 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 1608 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2876 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2876 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2876 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2876 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 30 PID 1720 wrote to memory of 1608 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 33 PID 1720 wrote to memory of 1608 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 33 PID 1720 wrote to memory of 1608 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 33 PID 1720 wrote to memory of 1608 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 33 PID 1720 wrote to memory of 2600 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 35 PID 1720 wrote to memory of 2600 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 35 PID 1720 wrote to memory of 2600 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 35 PID 1720 wrote to memory of 2600 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 35 PID 1720 wrote to memory of 2604 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 37 PID 1720 wrote to memory of 2604 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 37 PID 1720 wrote to memory of 2604 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 37 PID 1720 wrote to memory of 2604 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 37 PID 1720 wrote to memory of 1692 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 38 PID 1720 wrote to memory of 1692 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 38 PID 1720 wrote to memory of 1692 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 38 PID 1720 wrote to memory of 1692 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 38 PID 1720 wrote to memory of 1692 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 38 PID 1720 wrote to memory of 1692 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 38 PID 1720 wrote to memory of 1692 1720 2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HFXKjdTRGl.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HFXKjdTRGl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8DED.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HFXKjdTRGl.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eeea6d124f5d8be40ed99592205e438d
SHA1625d60b340ff22862ec12c305285a4d213d9070f
SHA256e769d23b82bc1fdaf5ac024de071bad920d9c97a83bd8ebe3fd4316cbe17c9ff
SHA51217b18b005985cb38d2eb16640c7c80472f5f14de22ba47ee839b1f4641dbdcbfd09296b71942eb3b24dd3bd24368b2976e92385a82f7e27fe99fa35d23d8c6ee
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD51fa04e2c8183d39032a452c3e0cb63d8
SHA10ef7830d920d2889470429e63a41a9266046dfaa
SHA256c52eee5af5395646296157613d613d5ba763d96d0d3bb79290b59531ae6edf3a
SHA51262d5076ea4b5d8f7eb537e9686b526f4747a050965fa84e6384433a271fd1462c6375c6f0fa28b0f39fa207d908c7fe2154eacbfcb524ed6c04dd99b8577712e