Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 13:35
Static task
static1
Behavioral task
behavioral1
Sample
3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe
-
Size
889KB
-
MD5
3a4b0695b3752747171249f731a42a0f
-
SHA1
472db8f1ad0121714b1c0692d050f055ee7117dc
-
SHA256
bd746ec7cac902a0b12f829efa801316f11b5ab6df024ff0f75c178134daad99
-
SHA512
a21fbc3d9c7c9c87ccab446ee7ec978826cadbe3faaa9fc6bb2fa07e4d5d9ecf7ea00de897ded2ff2452b951197f94d37d62e5d4d82e101eb1db7efaac4b26da
-
SSDEEP
12288:F5LfSgsVSj4s4IHK7zqcqpvYri3jZcYGnnwFN5pP0D+9uAw0OyVq/k:vQSksmPq7iK5pP0v0OAq/
Malware Config
Extracted
formbook
4.1
o4ms
fishingboatpub.com
trebor72.com
qualitycleanaustralia.com
amphilykenyx.com
jayte90.net
alveegrace.com
le-fleursoleil.com
volumoffer.com
businessbookwriters.com
alpin-art.com
firsttastetogo.com
catofc.com
ref-290.com
sbo2008.com
fortlauderdaleelevators.com
shanghaiyalian.com
majestybags.com
afcerd.com
myceliated.com
ls0a.com
chautauquapistolpermit.com
cq1937.com
riafellowship.com
sjzlyk120.com
onlinerebatemall.com
bjlmzmd.com
services-neetflix-info.info
khaapa.com
thehgboutique.com
iconndigital.com
ninjavendas.com
zeonyej.icu
iddqdtrk.com
taoy360.info
conanagent.icu
mobileflirting.online
lorrainelevis.com
bakerrepublic.com
tfi50.net
mildlobr.com
turnkeypet.com
instarmall.com
contilnetnoticias.website
symbiocrm.com
earn074.com
swapf.com
daveydavisphotography.com
notes2nobody.com
pensje.net
nanoplastiakopoma.com
inlandempiresublease.com
donaldjtryump.com
secondinningseva.com
zumohub.xyz
torbiedesigns.com
koastedco.com
lifestyleeve.com
purposepalacevenue.com
risk-managements.com
doluhediye.com
revolutionarylightworkers.com
smithridge.net
share-store.net
jastalks.com
nocodehost.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/800-20-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/800-23-0x0000000000700000-0x0000000000A03000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2728 set thread context of 800 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 800 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2728 wrote to memory of 772 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 31 PID 2728 wrote to memory of 772 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 31 PID 2728 wrote to memory of 772 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 31 PID 2728 wrote to memory of 772 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 31 PID 2728 wrote to memory of 800 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 33 PID 2728 wrote to memory of 800 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 33 PID 2728 wrote to memory of 800 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 33 PID 2728 wrote to memory of 800 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 33 PID 2728 wrote to memory of 800 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 33 PID 2728 wrote to memory of 800 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 33 PID 2728 wrote to memory of 800 2728 3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gBiomise" /XML "C:\Users\Admin\AppData\Local\Temp\tmp56D.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a4b0695b3752747171249f731a42a0f_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c20ddbce735911529debf3ab381fbf25
SHA10e49ca5602ec146332382f37ead97e48f0a5c34c
SHA25613b24f7bf66fc4bd095028652987b83079210faca28df680cebc0bc900baebda
SHA5123122d974be3d6f669296fd5a89dee18c4c5829ffa5b2c3e6541a401471e9b008ca0801f4d32e1d68f7d23fb5dfc9156356c7629c4d0d6dd4a175fb8ae737cd43