Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
d0c4f48f0b69ee5f08f7baf1460229ee
-
SHA1
1da3fd441ec04d0207d020300168b3b83f16d8b5
-
SHA256
085dd3415a1c0c601af338a15905c650935e18505e6ca71bf6ece1602bba19c3
-
SHA512
79a9798dea5a819259b152742ef62046c634d3d0e7c27c7c9d58df642b03e5f5a801880ef6dddb7c684a7ee45082a88b6effb5a7fa51c7b74d0ef8a8c12f6c0f
-
SSDEEP
24576:938hI5q8Bm8Mj/YoUOa9QQoehT2fXZvOi:u3HrjAowQihT2/
Malware Config
Extracted
formbook
4.1
odse
braedlifestyle.com
morganjohnsondesign.online
surup-v48.club
diypoolpaint.sydney
v-b7026-ghhh.space
vetyvar.com
lollydaisy.com
campsitesurvival.com
autocalibre.com
fusiontech3d.com
xn--udkog0cvez259c82sa.xyz
eccentricartist.com
jc-zg.com
wacwin.com
livehealthychoice.com
visijuara.com
phigsa.com
sabayawork.com
afcerd.com
joeyshousesessions.com
fancycn.com
fem-iam.com
sinopocasles.com
skypalaceportal.com
wqajecjeias.com
selfscienceslabs.com
workingtitle.agency
asianartsawards.com
healtyhouse.com
iloveme.life
espacioleiva.com
dac71047.com
soldbygenajohnson.com
motherhenscoop.com
polkadotcoins.com
muslimmediation.com
grub-groove.com
albertaeatsfood.com
mixedplaylists.com
miamimotorcycleshop.com
unegublog.com
generalssoccer.com
manhattanlandscapedesign.com
cuongnguyen3r2j.com
stonelodgeseniorliving.com
swissinternationaltrustb.com
novemento.club
bladesmts.com
espiaruncelular.net
talasoglufinans.com
sargeworld.com
newlifenowblog.com
sugaringpalms.com
xaoikevesesede.com
mintyline.com
paleonade.com
saharsaghi.com
kentchimney.com
whipitgudd.com
gmopst.com
likekopi.com
spoonproductions-catering.com
annotake.com
stm32heaven.com
guncelekspres.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2900-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2900-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2440 set thread context of 2900 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe 100 PID 2900 set thread context of 3460 2900 RegSvcs.exe 56 PID 3832 set thread context of 3460 3832 wscript.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe 2900 RegSvcs.exe 2900 RegSvcs.exe 2900 RegSvcs.exe 2900 RegSvcs.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe 3832 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2900 RegSvcs.exe 2900 RegSvcs.exe 2900 RegSvcs.exe 3832 wscript.exe 3832 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe Token: SeDebugPrivilege 2900 RegSvcs.exe Token: SeDebugPrivilege 3832 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2440 wrote to memory of 5084 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe 98 PID 2440 wrote to memory of 5084 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe 98 PID 2440 wrote to memory of 5084 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe 98 PID 2440 wrote to memory of 2900 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe 100 PID 2440 wrote to memory of 2900 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe 100 PID 2440 wrote to memory of 2900 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe 100 PID 2440 wrote to memory of 2900 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe 100 PID 2440 wrote to memory of 2900 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe 100 PID 2440 wrote to memory of 2900 2440 d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe 100 PID 3460 wrote to memory of 3832 3460 Explorer.EXE 101 PID 3460 wrote to memory of 3832 3460 Explorer.EXE 101 PID 3460 wrote to memory of 3832 3460 Explorer.EXE 101 PID 3832 wrote to memory of 4724 3832 wscript.exe 102 PID 3832 wrote to memory of 4724 3832 wscript.exe 102 PID 3832 wrote to memory of 4724 3832 wscript.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0c4f48f0b69ee5f08f7baf1460229ee_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hCrHbUC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp65E9.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e2923cd1bbbb441e25fcdd27eb6e3c93
SHA19fb978ab2758cb76678379540554704890ed45d3
SHA256c3d866b0fc30394c0f0337923f20766da8c33cbad6a7e8539569295c053bba71
SHA512914e14e645b769d5a3b7b354bdb2bd79ed57dc2f596c8569ef2224df6f38ec4dea7954e14137fc3e5351688af90cf11839eda6e3a4d152316580ae28cacf6b79