Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
9b316c1286cf6a10bf2447c128a76b46
-
SHA1
38940f6ab390ec2006693883bf5585a7ec38c0c6
-
SHA256
855dd7cf56397cb61245d06f6ed38576c71826737101275f66167986e602036f
-
SHA512
2023e376d2f311a5cfe1424654ecc16fb75b6003b488f265292abaa056d0e811a76dd8dc09533ab273f5d5e8878e2c5d552b3bcd89eb0363f95126fb7c93dc33
-
SSDEEP
12288:v/5pbb50EvcBQ3Tp4/IH3fjWqqhh8BAPg6OO3jTruN/YlRxsCplsj9lj/P61:v/5d5ABQ3TbH3fdqXP+O3jTruN/
Malware Config
Extracted
formbook
4.1
odse
braedlifestyle.com
morganjohnsondesign.online
surup-v48.club
diypoolpaint.sydney
v-b7026-ghhh.space
vetyvar.com
lollydaisy.com
campsitesurvival.com
autocalibre.com
fusiontech3d.com
xn--udkog0cvez259c82sa.xyz
eccentricartist.com
jc-zg.com
wacwin.com
livehealthychoice.com
visijuara.com
phigsa.com
sabayawork.com
afcerd.com
joeyshousesessions.com
fancycn.com
fem-iam.com
sinopocasles.com
skypalaceportal.com
wqajecjeias.com
selfscienceslabs.com
workingtitle.agency
asianartsawards.com
healtyhouse.com
iloveme.life
espacioleiva.com
dac71047.com
soldbygenajohnson.com
motherhenscoop.com
polkadotcoins.com
muslimmediation.com
grub-groove.com
albertaeatsfood.com
mixedplaylists.com
miamimotorcycleshop.com
unegublog.com
generalssoccer.com
manhattanlandscapedesign.com
cuongnguyen3r2j.com
stonelodgeseniorliving.com
swissinternationaltrustb.com
novemento.club
bladesmts.com
espiaruncelular.net
talasoglufinans.com
sargeworld.com
newlifenowblog.com
sugaringpalms.com
xaoikevesesede.com
mintyline.com
paleonade.com
saharsaghi.com
kentchimney.com
whipitgudd.com
gmopst.com
likekopi.com
spoonproductions-catering.com
annotake.com
stm32heaven.com
guncelekspres.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1764-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1764-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1764-27-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4880 set thread context of 1764 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe 93 PID 1764 set thread context of 3532 1764 RegSvcs.exe 56 PID 1764 set thread context of 3532 1764 RegSvcs.exe 56 PID 2876 set thread context of 3532 2876 svchost.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe 1764 RegSvcs.exe 1764 RegSvcs.exe 1764 RegSvcs.exe 1764 RegSvcs.exe 1764 RegSvcs.exe 1764 RegSvcs.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1764 RegSvcs.exe 1764 RegSvcs.exe 1764 RegSvcs.exe 1764 RegSvcs.exe 2876 svchost.exe 2876 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe Token: SeDebugPrivilege 1764 RegSvcs.exe Token: SeDebugPrivilege 2876 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4732 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe 91 PID 4880 wrote to memory of 4732 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe 91 PID 4880 wrote to memory of 4732 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe 91 PID 4880 wrote to memory of 1764 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe 93 PID 4880 wrote to memory of 1764 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe 93 PID 4880 wrote to memory of 1764 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe 93 PID 4880 wrote to memory of 1764 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe 93 PID 4880 wrote to memory of 1764 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe 93 PID 4880 wrote to memory of 1764 4880 9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe 93 PID 3532 wrote to memory of 2876 3532 Explorer.EXE 94 PID 3532 wrote to memory of 2876 3532 Explorer.EXE 94 PID 3532 wrote to memory of 2876 3532 Explorer.EXE 94 PID 2876 wrote to memory of 452 2876 svchost.exe 95 PID 2876 wrote to memory of 452 2876 svchost.exe 95 PID 2876 wrote to memory of 452 2876 svchost.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9b316c1286cf6a10bf2447c128a76b46_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kdZXxBrW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5A7F.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f0e5a3f55239fade69c1e84510aa5244
SHA137fa831a5e27f5ee38be9b0a468416243819bed8
SHA256a8eaa0688856b1ef89ea607cd190dabbccabc22fdafbc6bea0cf840c8da67733
SHA512084f5cfa48c7977221499b9f2b58c888194b3bf7012a895b0c06676022a357eac78e704036d97986b0106356073edbb3a861df8f829314c2588ea3827c855b76