Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe
-
Size
867KB
-
MD5
3f332ec29d9e058eb1c0e296b04b2518
-
SHA1
aa4d9429a1f410beb085f86fa4a5f516f99f6a8b
-
SHA256
df8b0772860e56938078f92e437d4c04ff34808f40837e249b85af1ffb4dee4b
-
SHA512
87037bf33969bded6e7e245dfe28edb3f2f1b57ea56b7071957157c2c16fbf4005a68dc198b336c751e346931e479a12f5dc1878b583e4e227a47d93d0700c79
-
SSDEEP
12288:RupVlyZLmQFafwiXjsDB2ZRgQtuyXnEs0YLEjK101Z/jit2NjFxOH+l:RuHWLlFcwkefdtyLE3DjiMNje
Malware Config
Extracted
formbook
4.1
m3uc
biostaticenergy.com
sociofy.media
prscan.com
sendsolution.info
four-three-technologies.com
xporntubesex.com
parisanavidi.com
eesegismundopereira.com
coursecamponline.com
arieconsulting.com
kateheneghan.com
techein.com
automotivesemltd.com
michellag.com
missionpossibletvshow.com
luxuryhomereno.com
borderlessnomads.com
regulus5.xyz
thursdayny.com
meditationmultiverse.com
nondignification.com
liberteeforall.com
stadiumustard.com
kikohawaii.com
planlive.xyz
jokysun.com
anekagenset.com
lphomeinspections.com
agape-agency.com
fittoflexapparel.com
charmsitup.com
wrightrealestates.com
maritimecrafters.com
anthonymaltipoopups.com
savethechildrenwarrior.net
zgqc1.com
joycemkennedy.com
blanks.supply
standardcrackers.online
lilthriftkid.com
dressedbyd.info
best20weddingregistry.com
adslab.site
promag300australia.com
fkjdjkejkfjkdefd.com
yourvegashomeearch.com
cosmeticsarabia.com
dreamdayland.club
galacticormus.com
circusse.com
mangobalya5.com
koreanathome.site
elhorizontecentral.com
wavelenz.com
dbeautyzones.com
arcadchlity.com
caravaninfo.icu
bananatasticventures.com
chefalfredobrown.com
zonalibrenoticias.com
note20launch.com
wbgglobal.com
upclosephotographs.com
9norte.com
naughty-milf-gfe.today
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/440-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1620 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4960 set thread context of 440 4960 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 440 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 440 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 1620 powershell.exe 1620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1620 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4960 wrote to memory of 1620 4960 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 90 PID 4960 wrote to memory of 1620 4960 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 90 PID 4960 wrote to memory of 1620 4960 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 90 PID 4960 wrote to memory of 440 4960 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 91 PID 4960 wrote to memory of 440 4960 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 91 PID 4960 wrote to memory of 440 4960 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 91 PID 4960 wrote to memory of 440 4960 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 91 PID 4960 wrote to memory of 440 4960 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 91 PID 4960 wrote to memory of 440 4960 3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f332ec29d9e058eb1c0e296b04b2518_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82