Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe
-
Size
921KB
-
MD5
53c14ef13d4a6bd9ce56da43567ac0d9
-
SHA1
51b6813d1f8d33bef00201ec5ae88cd1dba4e338
-
SHA256
94cbf229daa81e3a734f6199a8ab4d5fede7f71cdee579db4bb54369d531410b
-
SHA512
fe9dd981e04171e94a2f51db1081590238496723086176fe2953a325c5021fc790f0cb2653650ed81f2764ca089e5ec7d97e146952673355d94490a443d059cb
-
SSDEEP
12288:1zADtztyiNaTCSFSsFjdo9FecUZ+7/fosnyXWHMVYRlHK7zjzKbojReF:qD7yiN8tFSsFm3btCCxRo7KboM
Malware Config
Extracted
formbook
4.1
vd9n
theunwrappedcollective.com
seckj-ic.com
tyresandover.com
thetrophyworld.com
fonggrconstruction.com
hopiproject.com
sktitle.com
charlotteobscurer.com
qjuhe.com
girlzglitter.com
createmylawn.com
hempcbgpill.com
zzdfdzkj.com
shreehariessential.com
226sm.com
getcupscall.com
neuralviolin.com
sanskaar.life
xn--fhqrm54yyukopc.com
togetherx4fantasy5star.today
buyonlinesaree.com
percyshandman.site
hatchethangout.com
rugpat.com
zen-gizmo.com
vipmomali.com
lacerasavall.cat
aqueouso.com
mkolgems.com
sevenhundredseventysix.fund
fotografhannaneret.com
mitravy.com
bmtrans.net
linterpreting.com
izquay.com
sawaturkey.com
marche-maman.com
eemygf.com
animenovel.com
travelssimply.com
montecitobutterfly.com
volebahis.com
daniela.red
ramseyedk12.com
leyterealestate.info
patriotstrong.net
vkgcrew.com
nadhiradeebaazkiya.online
hotelcarre.com
myfabulouscollection.com
stellantis-luxury-rent.com
hn2020.xyz
emilyscopes.com
lotosouq.com
lovecord.date
stconstant.online
volkite-culverin.net
allwaysautism.com
sheisnatashasimone.com
sepantaceram.com
ishopgrady.com
lifestorycard.com
sexybbwavailable.website
domainbaycapital.com
constructioncleanup.pro
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4912-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4912-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2396 set thread context of 4912 2396 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe 101 PID 4912 set thread context of 3436 4912 RegSvcs.exe 56 PID 1932 set thread context of 3436 1932 msdt.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4912 RegSvcs.exe 4912 RegSvcs.exe 4912 RegSvcs.exe 4912 RegSvcs.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe 1932 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4912 RegSvcs.exe 4912 RegSvcs.exe 4912 RegSvcs.exe 1932 msdt.exe 1932 msdt.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 4912 RegSvcs.exe Token: SeDebugPrivilege 1932 msdt.exe Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3436 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4896 2396 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe 99 PID 2396 wrote to memory of 4896 2396 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe 99 PID 2396 wrote to memory of 4896 2396 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe 99 PID 2396 wrote to memory of 4912 2396 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe 101 PID 2396 wrote to memory of 4912 2396 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe 101 PID 2396 wrote to memory of 4912 2396 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe 101 PID 2396 wrote to memory of 4912 2396 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe 101 PID 2396 wrote to memory of 4912 2396 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe 101 PID 2396 wrote to memory of 4912 2396 53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe 101 PID 3436 wrote to memory of 1932 3436 Explorer.EXE 102 PID 3436 wrote to memory of 1932 3436 Explorer.EXE 102 PID 3436 wrote to memory of 1932 3436 Explorer.EXE 102 PID 1932 wrote to memory of 432 1932 msdt.exe 103 PID 1932 wrote to memory of 432 1932 msdt.exe 103 PID 1932 wrote to memory of 432 1932 msdt.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\53c14ef13d4a6bd9ce56da43567ac0d9_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zDKttPF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6ACB.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aca33a091b9ac7ab1ab523ea926170fc
SHA1b9f17019fa1041a8caf96a773fdb9e555e1aefa4
SHA256c49303e5f6382c36a4f5c9a0f3f55168be3805a20234e08ac884e893cb4d4720
SHA512394bee63fc88d700c608953d622eb4fe068d51a157df55747d8cca4d201ce0dd32f335def6005c0e855d8a599cd9c5a2c3d07ae6031a45d6c308bb8d7c21c8d6