Analysis
-
max time kernel
92s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
c793aa3151a912ac2f8395472d580e02
-
SHA1
3a57bb08ee72c170abf5baa6ebc2bf3c06242ba8
-
SHA256
29559b48621146787d64cd953d655cd34f1b4a029c450d4364e2026e8a671982
-
SHA512
733ddccda37f02e7e5d6c435348cc711819fde7efb3e3a60506e84d787a0d5049e1b822a368c6fa65433a14e026982efa418808b354ab27665e30c11c0dab561
-
SSDEEP
12288:FjyBKuaUvheZI/hEpLrXtRSf6kXNYMGLYDXIE2tuyG24NGX2saLGPA5E6WtXSitJ:wpeZI/GBy6kd6L5E2dH
Malware Config
Extracted
formbook
4.1
j7e
cefuoficial.com
luxmusicclub.com
getridofmyed.xyz
sports-plaza.com
peteropsomer.com
kemendi.com
divinciresolve.com
readtogrowup.com
hidex-corp.com
aladininternational.com
snesait.art
ezzpick.net
saveashow.com
eazyprintsplus.com
usadatesclub.com
rafaelraf.com
themiamadison.com
regarta.com
aiocitys.net
ahorn-invest.com
anajoiasrj.com
rozamail.com
mauriciosagastegui.com
cohorsetrails.com
alboxshop.com
jrqualityautodetailing.com
americanroofingnow.com
scszwl.com
poicol.xyz
primarybillserv.com
smallfinancials.com
rahpilates.info
workflowxray.com
clothapparels.com
cathycre8.co.uk
familiesstores.com
printbonn.com
manismas.com
krispykremesweetpeek.com
redgtc.com
uixsv.com
superiorvillage.com
fdgrenewables.com
appments.com
shanscorp.com
modelleftcoast.com
lookitlook.com
inijuslem.com
bjtqbxg.com
ontariolitigationlawyers.com
certificationroundtable.com
levelup-edu.com
muahangonl.com
lexingtonclarke.com
brapscallions.com
elti-stables.com
nivxros.com
diversifiededhospitality.com
lnstagramappealform.com
anushwirasinha.net
shopalife.xyz
mycryptotrading.net
gxsmrtwtch.icu
williamandholland.com
jzmbgjj.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1444-8-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3400 set thread context of 1444 3400 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1444 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 1444 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3400 wrote to memory of 4528 3400 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 91 PID 3400 wrote to memory of 4528 3400 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 91 PID 3400 wrote to memory of 4528 3400 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 91 PID 3400 wrote to memory of 1444 3400 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 93 PID 3400 wrote to memory of 1444 3400 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 93 PID 3400 wrote to memory of 1444 3400 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 93 PID 3400 wrote to memory of 1444 3400 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 93 PID 3400 wrote to memory of 1444 3400 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 93 PID 3400 wrote to memory of 1444 3400 c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yYztPujITIdJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp38FD.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\c793aa3151a912ac2f8395472d580e02_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58138eeb435ab44aa9deb03652d1b2f99
SHA1330e9bbc2ab95408304539eef795574445c6ee9a
SHA256084823073c2752ff9f0a273d5f6ef7528f80b110a11f754cabe73faca2184f13
SHA5124d80dd79aa4367708ac088845db9f6cfe31dd10c29414cdd6df6f1d37ec9ab36a02cf7b6625c89d8b3401a0cb8efecbfb20136ce3ff5388f9aaeee7758884a6a