General
-
Target
234a9557e370d3d750070b64808b0426_JaffaCakes118
-
Size
734KB
-
Sample
241008-wvc3katglc
-
MD5
234a9557e370d3d750070b64808b0426
-
SHA1
5361da7e6f3d85285048b3a82f33f0d74309dcfd
-
SHA256
7fe042e93ace8e9e3ac6c6b4f14847addc613c3c710a3e2bb63d36e4e188ec72
-
SHA512
3784a8986614286d56e3df35a30d7cae6ccc96d841f694e087296cca2d5e4bba25da37189cec36b7a6cb87f4d97cb47ffd17a004b9d5faeee128e6dd9dbba60f
-
SSDEEP
12288:MXqv2J82iNeHK7zEIT4IVQG//+Vv2lIewZPVV8b8b9c9GZrZ4eB5eUZ7/:MXqv31b5yGzl32PVCbK9c9GlCeB5eUZ7
Static task
static1
Behavioral task
behavioral1
Sample
234a9557e370d3d750070b64808b0426_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
iesm
terracounselling.com
gmartindiastores.com
themekinhdoanh.com
chemluan.com
volvordposts.com
poyef.com
flyraven.com
tulord.com
landoflostarchitects.com
jdemong.com
tiendadecabello.online
adjimmobiliere.com
ssga-sia.com
senegalo-britanique.com
simplyhealthcareplsns.com
danishbay.com
melanieandisrael.com
idgrafo.com
forex160.com
ekohectaresandvilla.com
buyyoursuzuki.com
somersetfairfield.com
schekerland.com
paye-me.com
b5533.com
tentsourceusa.com
thefordcapri.com
carolynluttrell.com
autoselections.com
rentmyflowersplus.com
milayapi.net
1fitinc.com
ck-gran.site
kiananthony.com
golpasz.com
challengeakseptedyogee.xyz
changfu888.com
cngj815.com
futoga.com
montereycannabisclub.com
app-disc-mobile.com
liconadesigns.com
funsolitaireking.com
classicyachtspoom.com
msrawyh.com
mangounicorn.com
tyigh.com
ijiayong.com
skill2020.net
tubekittysex.net
kootermgt.com
visionsofhomedesign.com
pinkdogink.com
resmipkv.com
gabiortiz2023.com
eaforexbank.space
zyzxcn.com
sweetlystudio.com
panigrohon.com
jmbcfmoto.com
juxrams.info
kia.expert
obigkart.com
touchpaddles.com
htmlemailrepair.com
Targets
-
-
Target
234a9557e370d3d750070b64808b0426_JaffaCakes118
-
Size
734KB
-
MD5
234a9557e370d3d750070b64808b0426
-
SHA1
5361da7e6f3d85285048b3a82f33f0d74309dcfd
-
SHA256
7fe042e93ace8e9e3ac6c6b4f14847addc613c3c710a3e2bb63d36e4e188ec72
-
SHA512
3784a8986614286d56e3df35a30d7cae6ccc96d841f694e087296cca2d5e4bba25da37189cec36b7a6cb87f4d97cb47ffd17a004b9d5faeee128e6dd9dbba60f
-
SSDEEP
12288:MXqv2J82iNeHK7zEIT4IVQG//+Vv2lIewZPVV8b8b9c9GZrZ4eB5eUZ7/:MXqv31b5yGzl32PVCbK9c9GlCeB5eUZ7
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-