General
-
Target
abab9797200c25f60d745d3687bec461_JaffaCakes118
-
Size
1.5MB
-
Sample
241128-kdbydsxpdj
-
MD5
abab9797200c25f60d745d3687bec461
-
SHA1
0c0f500ca55d81df716f1bb40ea2c9d0c747b6c3
-
SHA256
596f80f5d1291658025f890159518fcabbfb1b9500187b237fe68eb01f6f59cb
-
SHA512
9d397c970424f9eb3b403cf109ff6a2726474ebe0ca8335346db13856535867be6732d13cde4e587f4619daefcad34ff7ba5df2062efe59cfffe14b8b9951ec6
-
SSDEEP
12288:jBiZV1lP0f839UGayJ+UkfYITPdW+Ey9jYBvfe1/w/KgQ6H+Uy1Susr8MmH3jH:onl0f8tUGajlLc+t9jYa/wsZZS5R0
Static task
static1
Behavioral task
behavioral1
Sample
abab9797200c25f60d745d3687bec461_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
owt8
globalstainlesssteel.com
bentleymichaels.com
svproductiveparents.com
vikinger.one
kiarabrunett.com
lakelandchiefs.com
kickzcity.com
ceroestrespma.com
torchfarmer.com
angelie26.com
pekinggardenonlineorder.com
brooklynrealtynow.com
makaroniwino.com
wiresncircuits.com
vwealth-archive.com
anfang1718.com
sahaconcierge.com
rctuition.com
premiercovidscreening.com
ryl3inc.com
kendallcorso.com
applianceversus.com
bpdszx.com
elmavans.com
seabridgexim.com
sexuallegends.com
suruchihirawat.com
alexisroseapperal.com
nakupmx.com
rentcallcenter.com
bosquefamily.com
jennyouseph.com
oszczedzanie.net
lrzhnsvl.icu
plansights.com
scaled.email
flowavalon.com
hadassahgt.com
guestsemails.com
bleuarmor.com
modul8sa.com
optionsvig.com
holisticbrews.com
doxyhand.com
rockingroles.com
carladessi.com
gustobolivia.com
afcerd.com
wzqp666.com
gerbangpengetahuan.com
veropatio.com
gzsycnc.com
louisbmartinez100th.com
bc8688.com
nuckelavee.net
amazon-t8.com
myvegasinsider.com
saltybonesservices.com
taylerstutoring.com
cureelements.com
sugamayurved.com
aquaticwayoflife.com
obsswapmeet.com
gariwala.net
bacha1.com
Targets
-
-
Target
abab9797200c25f60d745d3687bec461_JaffaCakes118
-
Size
1.5MB
-
MD5
abab9797200c25f60d745d3687bec461
-
SHA1
0c0f500ca55d81df716f1bb40ea2c9d0c747b6c3
-
SHA256
596f80f5d1291658025f890159518fcabbfb1b9500187b237fe68eb01f6f59cb
-
SHA512
9d397c970424f9eb3b403cf109ff6a2726474ebe0ca8335346db13856535867be6732d13cde4e587f4619daefcad34ff7ba5df2062efe59cfffe14b8b9951ec6
-
SSDEEP
12288:jBiZV1lP0f839UGayJ+UkfYITPdW+Ey9jYBvfe1/w/KgQ6H+Uy1Susr8MmH3jH:onl0f8tUGajlLc+t9jYa/wsZZS5R0
-
Formbook family
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1