Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe
-
Size
421KB
-
MD5
aeb64eb2a6f01a3102aa9b4d8e6ec148
-
SHA1
c3841970b7fd0e3cb1deb6422423d3a86da793f0
-
SHA256
bae32b579c2bb3d0f49b9fefabd433b5cfa3a398bd9f49b675fc628a352eeb44
-
SHA512
aa74a13b01084c7175c179f823b9e35f6688a7bb5dfc320ca4c054139e9eb2c3cabc08fee60853899c03997dd6c295619f0427523afdbf979897db1ab7ec2f10
-
SSDEEP
6144:0qWlspsQw0xAcNMoFE9yaUThi3vpV7KyQiMDga0O3kRDpqpF24BwOjx5heO:HWlDl0UqXc7KyUDN0UYDpQFz3jxv
Malware Config
Extracted
formbook
4.1
cg53
sugarlushcosmetic.com
a2net.info
ximakaya.com
thevochick.com
khafto.com
zsgpbgsbh.icu
psm-gen.com
jhxhotei.com
7991899.com
nda.today
fourseasonsvanlines.com
splediferous.info
thesqlgoth.com
newpathequine.com
advan.digital
skamanderboats.com
thejnit.com
pardusarms.net
mevasoluciones.com
biggdogg5n2.com
anogirl.com
xinyisanreqi.com
2mothertruckers.net
phongvevic.com
atmosphere.rent
amabie-net.com
stocksp24.com
starseedbeing.com
icreditmalaysia.com
inochinokagayaki.net
christianbooktrailer.com
gidrot.com
junglecli.com
greenportcivic.com
beyondparenting101.com
tracisolomon.xyz
healinghandssalem.com
hackersincgolf.com
goselling.solutions
cumuluspharma.com
ramblecollections.com
mac-marine.com
likeit21.com
gdlejing.com
si600.net
greenhearthome.com
tourps.com
lvyi19.com
frequent420.com
goodteattirerebates.com
melanie-gore.com
comfsresidential.com
vrgkk.com
losmaestrosencarpinteria.com
nikhitaindustries.com
fresgolens.online
xpj777.life
zerkalo-mr-bit-casino.com
thorsensgrinding.com
ronniethemole.com
poundlove.com
joansv.com
finneyplace.com
dakotacntr.com
domoexpra.club
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/10236-2185-0x0000000000400000-0x0000000000433000-memory.dmp formbook behavioral1/files/0x0007000000017546-2197.dat formbook -
Executes dropped EXE 2 IoCs
pid Process 2120 FB_90EA.tmp.exe 3024 FB_9139.tmp.exe -
Loads dropped DLL 4 IoCs
pid Process 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\paint = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\paint\\paint.exe\"" aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1924 set thread context of 10236 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 32 PID 3024 set thread context of 1208 3024 FB_9139.tmp.exe 21 PID 3024 set thread context of 1208 3024 FB_9139.tmp.exe 21 PID 1920 set thread context of 1208 1920 NETSTAT.EXE 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB_9139.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1920 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 3024 FB_9139.tmp.exe 3024 FB_9139.tmp.exe 3024 FB_9139.tmp.exe 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE 1920 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3024 FB_9139.tmp.exe 3024 FB_9139.tmp.exe 3024 FB_9139.tmp.exe 3024 FB_9139.tmp.exe 1920 NETSTAT.EXE 1920 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe Token: SeDebugPrivilege 3024 FB_9139.tmp.exe Token: SeDebugPrivilege 1920 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1924 wrote to memory of 10228 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 31 PID 1924 wrote to memory of 10228 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 31 PID 1924 wrote to memory of 10228 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 31 PID 1924 wrote to memory of 10228 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 31 PID 1924 wrote to memory of 10236 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 32 PID 1924 wrote to memory of 10236 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 32 PID 1924 wrote to memory of 10236 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 32 PID 1924 wrote to memory of 10236 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 32 PID 1924 wrote to memory of 10236 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 32 PID 1924 wrote to memory of 10236 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 32 PID 1924 wrote to memory of 10236 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 32 PID 1924 wrote to memory of 10236 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 32 PID 1924 wrote to memory of 10236 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 32 PID 1924 wrote to memory of 10236 1924 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 32 PID 10236 wrote to memory of 2120 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 33 PID 10236 wrote to memory of 2120 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 33 PID 10236 wrote to memory of 2120 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 33 PID 10236 wrote to memory of 2120 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 33 PID 10236 wrote to memory of 3024 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 34 PID 10236 wrote to memory of 3024 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 34 PID 10236 wrote to memory of 3024 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 34 PID 10236 wrote to memory of 3024 10236 aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe 34 PID 3024 wrote to memory of 1920 3024 FB_9139.tmp.exe 35 PID 3024 wrote to memory of 1920 3024 FB_9139.tmp.exe 35 PID 3024 wrote to memory of 1920 3024 FB_9139.tmp.exe 35 PID 3024 wrote to memory of 1920 3024 FB_9139.tmp.exe 35 PID 1920 wrote to memory of 3008 1920 NETSTAT.EXE 36 PID 1920 wrote to memory of 3008 1920 NETSTAT.EXE 36 PID 1920 wrote to memory of 3008 1920 NETSTAT.EXE 36 PID 1920 wrote to memory of 3008 1920 NETSTAT.EXE 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe3⤵PID:10228
-
-
C:\Users\Admin\AppData\Local\Temp\aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\aeb64eb2a6f01a3102aa9b4d8e6ec148_JaffaCakes118.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:10236 -
C:\Users\Admin\AppData\Local\Temp\FB_90EA.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_90EA.tmp.exe"4⤵
- Executes dropped EXE
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\FB_9139.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_9139.tmp.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\FB_9139.tmp.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD574bafb3e707c7b0c63938ac200f99c7f
SHA110c5506337845ed9bf25c73d2506f9c15ab8e608
SHA256129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689
SHA5125b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781
-
Filesize
182KB
MD548ece2ca39a9eae7fced7418cf071d46
SHA17570995cbf699088a8f208015cb2c92be5bc837a
SHA2564119b29bc938578d5d243db714d0619228d37c10ccaa52925f9e81a410720d59
SHA512e897fded4b643054796e410cadcc348c1215c934fe70f5407e36e9f10e59e2b10b7edcbb99d746709aef8ff498d98d848ada90fb477ea732a128ee138ed0fd3b