Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe
-
Size
902KB
-
MD5
d2e0695f6f0e579c99b06442caad21ae
-
SHA1
a6b18219427005938b989cc295ce15797e12b50a
-
SHA256
930ca41592c497666685d31cebd2afc885706bdad347e102a039015802d05bef
-
SHA512
94341063e488102f8e15c56f8482e4f46a834b4495beeb2d9465d674a7ffc7b54252ddddf26543ad8053a5cc82d3c61c6002b72b6cd8cb796580ef225c00adc5
-
SSDEEP
12288:O/Ev0VbMM6n29iHK7zWHN1ScXK2zVl+9j2N5+8AdyFs1Ybab/hog6J49ZU3h59R:6BkSh81G2JRPcYbatFaIqJR
Malware Config
Extracted
formbook
4.1
vd9n
theunwrappedcollective.com
seckj-ic.com
tyresandover.com
thetrophyworld.com
fonggrconstruction.com
hopiproject.com
sktitle.com
charlotteobscurer.com
qjuhe.com
girlzglitter.com
createmylawn.com
hempcbgpill.com
zzdfdzkj.com
shreehariessential.com
226sm.com
getcupscall.com
neuralviolin.com
sanskaar.life
xn--fhqrm54yyukopc.com
togetherx4fantasy5star.today
buyonlinesaree.com
percyshandman.site
hatchethangout.com
rugpat.com
zen-gizmo.com
vipmomali.com
lacerasavall.cat
aqueouso.com
mkolgems.com
sevenhundredseventysix.fund
fotografhannaneret.com
mitravy.com
bmtrans.net
linterpreting.com
izquay.com
sawaturkey.com
marche-maman.com
eemygf.com
animenovel.com
travelssimply.com
montecitobutterfly.com
volebahis.com
daniela.red
ramseyedk12.com
leyterealestate.info
patriotstrong.net
vkgcrew.com
nadhiradeebaazkiya.online
hotelcarre.com
myfabulouscollection.com
stellantis-luxury-rent.com
hn2020.xyz
emilyscopes.com
lotosouq.com
lovecord.date
stconstant.online
volkite-culverin.net
allwaysautism.com
sheisnatashasimone.com
sepantaceram.com
ishopgrady.com
lifestorycard.com
sexybbwavailable.website
domainbaycapital.com
constructioncleanup.pro
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/516-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/516-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1068 set thread context of 516 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe 93 PID 516 set thread context of 3444 516 RegSvcs.exe 56 PID 544 set thread context of 3444 544 NETSTAT.EXE 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 544 NETSTAT.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe 516 RegSvcs.exe 516 RegSvcs.exe 516 RegSvcs.exe 516 RegSvcs.exe 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE 544 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 516 RegSvcs.exe 516 RegSvcs.exe 516 RegSvcs.exe 544 NETSTAT.EXE 544 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe Token: SeDebugPrivilege 516 RegSvcs.exe Token: SeDebugPrivilege 544 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1068 wrote to memory of 1584 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe 91 PID 1068 wrote to memory of 1584 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe 91 PID 1068 wrote to memory of 1584 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe 91 PID 1068 wrote to memory of 516 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe 93 PID 1068 wrote to memory of 516 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe 93 PID 1068 wrote to memory of 516 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe 93 PID 1068 wrote to memory of 516 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe 93 PID 1068 wrote to memory of 516 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe 93 PID 1068 wrote to memory of 516 1068 d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe 93 PID 3444 wrote to memory of 544 3444 Explorer.EXE 94 PID 3444 wrote to memory of 544 3444 Explorer.EXE 94 PID 3444 wrote to memory of 544 3444 Explorer.EXE 94 PID 544 wrote to memory of 1704 544 NETSTAT.EXE 95 PID 544 wrote to memory of 1704 544 NETSTAT.EXE 95 PID 544 wrote to memory of 1704 544 NETSTAT.EXE 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2e0695f6f0e579c99b06442caad21ae_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TDLavS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp33FC.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1584
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cba8faef1c85344d053ccd8ee46ef68f
SHA13977c35b3d51f5611ab8f21e055ef6a8cbf66988
SHA256ba99bd4cdb17a074b1b27e7d101857f4880e04c2f6a76928adb5dee12c1834ba
SHA512c1703510fc4ca3098a2bb670321540d6124585212de70e76e51c01c5644d463aee6abbfb101c5c0122ed8127dd1d8d08a470df7763eb137de213bc347eaff260