Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
c793aa3151a912ac2f8395472d580e02
-
SHA1
3a57bb08ee72c170abf5baa6ebc2bf3c06242ba8
-
SHA256
29559b48621146787d64cd953d655cd34f1b4a029c450d4364e2026e8a671982
-
SHA512
733ddccda37f02e7e5d6c435348cc711819fde7efb3e3a60506e84d787a0d5049e1b822a368c6fa65433a14e026982efa418808b354ab27665e30c11c0dab561
-
SSDEEP
12288:FjyBKuaUvheZI/hEpLrXtRSf6kXNYMGLYDXIE2tuyG24NGX2saLGPA5E6WtXSitJ:wpeZI/GBy6kd6L5E2dH
Malware Config
Extracted
formbook
4.1
j7e
cefuoficial.com
luxmusicclub.com
getridofmyed.xyz
sports-plaza.com
peteropsomer.com
kemendi.com
divinciresolve.com
readtogrowup.com
hidex-corp.com
aladininternational.com
snesait.art
ezzpick.net
saveashow.com
eazyprintsplus.com
usadatesclub.com
rafaelraf.com
themiamadison.com
regarta.com
aiocitys.net
ahorn-invest.com
anajoiasrj.com
rozamail.com
mauriciosagastegui.com
cohorsetrails.com
alboxshop.com
jrqualityautodetailing.com
americanroofingnow.com
scszwl.com
poicol.xyz
primarybillserv.com
smallfinancials.com
rahpilates.info
workflowxray.com
clothapparels.com
cathycre8.co.uk
familiesstores.com
printbonn.com
manismas.com
krispykremesweetpeek.com
redgtc.com
uixsv.com
superiorvillage.com
fdgrenewables.com
appments.com
shanscorp.com
modelleftcoast.com
lookitlook.com
inijuslem.com
bjtqbxg.com
ontariolitigationlawyers.com
certificationroundtable.com
levelup-edu.com
muahangonl.com
lexingtonclarke.com
brapscallions.com
elti-stables.com
nivxros.com
diversifiededhospitality.com
lnstagramappealform.com
anushwirasinha.net
shopalife.xyz
mycryptotrading.net
gxsmrtwtch.icu
williamandholland.com
jzmbgjj.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2592-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2592-18-0x0000000000900000-0x0000000000C03000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2148 set thread context of 2592 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2592 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2076 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2076 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2076 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2076 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2592 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 33 PID 2148 wrote to memory of 2592 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 33 PID 2148 wrote to memory of 2592 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 33 PID 2148 wrote to memory of 2592 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 33 PID 2148 wrote to memory of 2592 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 33 PID 2148 wrote to memory of 2592 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 33 PID 2148 wrote to memory of 2592 2148 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yYztPujITIdJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8A84.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD590f86e8f5dc112be1a62941388d15002
SHA1f90dc2758705e8e17ac765246d5635bc83495794
SHA256737d7ff4924751adb21a4e0f658387c3ba1993286262be1d5eb6a115f524b58d
SHA5122285026db590dfbe1fa06b5995edfb3168210630919e6eeff5304e5664e5697b26822c861f9528bcce2c9cae35114a66847d32bf52bdad52142afd2f84f65d0b