Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe
-
Size
867KB
-
MD5
3f332ec29d9e058eb1c0e296b04b2518
-
SHA1
aa4d9429a1f410beb085f86fa4a5f516f99f6a8b
-
SHA256
df8b0772860e56938078f92e437d4c04ff34808f40837e249b85af1ffb4dee4b
-
SHA512
87037bf33969bded6e7e245dfe28edb3f2f1b57ea56b7071957157c2c16fbf4005a68dc198b336c751e346931e479a12f5dc1878b583e4e227a47d93d0700c79
-
SSDEEP
12288:RupVlyZLmQFafwiXjsDB2ZRgQtuyXnEs0YLEjK101Z/jit2NjFxOH+l:RuHWLlFcwkefdtyLE3DjiMNje
Malware Config
Extracted
formbook
4.1
m3uc
biostaticenergy.com
sociofy.media
prscan.com
sendsolution.info
four-three-technologies.com
xporntubesex.com
parisanavidi.com
eesegismundopereira.com
coursecamponline.com
arieconsulting.com
kateheneghan.com
techein.com
automotivesemltd.com
michellag.com
missionpossibletvshow.com
luxuryhomereno.com
borderlessnomads.com
regulus5.xyz
thursdayny.com
meditationmultiverse.com
nondignification.com
liberteeforall.com
stadiumustard.com
kikohawaii.com
planlive.xyz
jokysun.com
anekagenset.com
lphomeinspections.com
agape-agency.com
fittoflexapparel.com
charmsitup.com
wrightrealestates.com
maritimecrafters.com
anthonymaltipoopups.com
savethechildrenwarrior.net
zgqc1.com
joycemkennedy.com
blanks.supply
standardcrackers.online
lilthriftkid.com
dressedbyd.info
best20weddingregistry.com
adslab.site
promag300australia.com
fkjdjkejkfjkdefd.com
yourvegashomeearch.com
cosmeticsarabia.com
dreamdayland.club
galacticormus.com
circusse.com
mangobalya5.com
koreanathome.site
elhorizontecentral.com
wavelenz.com
dbeautyzones.com
arcadchlity.com
caravaninfo.icu
bananatasticventures.com
chefalfredobrown.com
zonalibrenoticias.com
note20launch.com
wbgglobal.com
upclosephotographs.com
9norte.com
naughty-milf-gfe.today
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2244-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3012 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2708 set thread context of 2244 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2244 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 3012 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3012 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2708 wrote to memory of 3012 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 31 PID 2708 wrote to memory of 3012 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 31 PID 2708 wrote to memory of 3012 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 31 PID 2708 wrote to memory of 3012 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2244 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2244 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2244 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2244 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2244 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2244 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2244 2708 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-