Analysis
-
max time kernel
94s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 11:52
Static task
static1
Behavioral task
behavioral1
Sample
a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
a1c4645815d0ab06831f62042cfa0da0
-
SHA1
e3ce2d0fc9bd18ab30d589f052edce9ca410f2ee
-
SHA256
a03ebb1ad2450b07206923043ad865cb83e1d4798a9273704a9626854fd17399
-
SHA512
a34d0c18b833f36e0698e2396270a43ed93d5d2839fa94753ad5fa4e4bf9ec8ecfb3d38f17c0384f30dde1d838c1cf462a40f14da8f430788e5e51cd0162e020
-
SSDEEP
24576:4SZIpRCJh5KhAEoaPMRfyT43jJ3cYp9KnZZS5R0:ApR0cjoaPM5yCJ3ck923B
Malware Config
Extracted
formbook
4.1
nff
shinseikai.site
creditmystartup.com
howtovvbucks.com
betterfromthebeginning.com
oubacm.com
stonalogov.com
gentrypartyof8.com
cuesticksandsupplies.com
joelsavestheday.com
llanobnb.com
ecclogic.com
miempaque.com
cai23668.com
miscdr.net
twzhhq.com
bloomandbrewcafe.com
angcomleisure.com
mafeeboutique.com
300coin.club
brooksranchhomes.com
konversiondigital.com
dominivision.com
superiorshinedetailing.net
thehomechef.global
dating-web.site
gcbsclubc.com
mothererph.com
pacleanfuel.com
jerseryshorenflflagfootball.com
roberthyatt.com
wwwmacsports.com
tearor.com
american-ai.com
mkyiyuan.com
gempharmatechllc.com
verdijvtc.com
zimnik-bibo.one
heatherdarkauthor.net
dunn-labs.com
automotivevita.com
bersatubagaidulu.com
gorillarecruiting.com
mikecdmusic.com
femuveewedre.com
onyxmodsllc.com
ooweesports.com
dezeren.com
foeweifgoor73dz.com
sorchaashe.com
jamiitulivu.com
jifengshijie.com
ranchfiberglas.com
glendalesocialmediaagency.com
icuvietnam.com
404hapgood.com
planetturmeric.com
danfrem.com
amazonautomationbusiness.com
switchfinder.com
diversifiedforest.com
findnehomes.com
rsyueda.com
colombianmatrimony.com
evan-dawson.info
yellow-wink.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3612-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exedescription pid Process procid_target PID 3644 set thread context of 3612 3644 a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exepid Process 3612 a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe 3612 a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exedescription pid Process procid_target PID 3644 wrote to memory of 3612 3644 a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe 91 PID 3644 wrote to memory of 3612 3644 a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe 91 PID 3644 wrote to memory of 3612 3644 a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe 91 PID 3644 wrote to memory of 3612 3644 a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe 91 PID 3644 wrote to memory of 3612 3644 a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe 91 PID 3644 wrote to memory of 3612 3644 a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1c4645815d0ab06831f62042cfa0da0_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-