General
-
Target
JaffaCakes118_4c7d13f022c276f0e8d38393d2a861c14d401258797a48fcd01a9c55f69e4a19
-
Size
494KB
-
Sample
241221-1lt2yazqhx
-
MD5
a6c1d970fae0fb2a52840e71ae2a9628
-
SHA1
0af3d26b8fb2ec00321e24b06ece1b9af9dbd11f
-
SHA256
4c7d13f022c276f0e8d38393d2a861c14d401258797a48fcd01a9c55f69e4a19
-
SHA512
38d0c8b584a2b1a5f76e95bdeb1b2ca50d62a4b3e936a585294009628c956fe32a1d3c97ef6313c9dfd9e02224d986afe4abd5d4bcda945f34ab048073a9b754
-
SSDEEP
12288:66f7UFfaJuONjfdiJHKi+uCbz/vGWtX2q2s:smuIrIpSz2WtX2q2s
Static task
static1
Behavioral task
behavioral1
Sample
a3d145e3c72db7ea3e18a306410a0445222a8ce83235794dc404dd470843caf2.exe
Resource
win7-20240729-en
Malware Config
Extracted
formbook
4.1
o27j
jimchim.club
aerovistasllc.com
gpdy5-zxs4j-8-ee.xyz
ilzro.tech
tesringnyc.com
dubulk.com
humiservice.com
torrentpa.com
kiralikbahisayfalari.com
tokoporn.xyz
pihgos.xyz
ultimateguirtar.com
awanpetir.com
mywafflehelps.com
synergy.cfd
spatialdraftingsolutions.com
psmf.xyz
jazzontime.com
blns-law.com
more2moors.com
raickle.xyz
youguo001.xyz
fashiondelightful.quest
tshxpw.com
xn--sjqz3uqybb4fc7lu2b7zi.site
zzylmjj.com
rubymine.site
hunnong.top
uz9.bet
fidfaplus.com
halal-thuisbezorgd.site
lifestyleonlineshopping.com
waterbasedcamp.events
ivettezketodietofficial.site
aid-nongyankeji.site
cidgesg.site
stonedogpizza.com
xn--uis76cg5sy3cm9rrsc.site
expert-ceramic.com
50yearson.com
roosandroos.com
trapfreedombeatz.com
welcometoparadise-mc.com
kevinbrightstudio.com
week-lifecircle.com
43499v.com
jpsgb.xyz
eaem.xyz
soprintpcs.com
index-courierservices.xyz
finneybussa.com
respectiveusketo.site
nashvilleweddingshop.com
opptify.com
terra-station-walet.store
salamb.site
tiendalondonparis.com
brightmindsacademypcs.com
forteefy.com
3587office.com
hancydesigngroup.com
integral-erp.tech
lossvalue.com
uzumluvilla.com
decentralised-protection.tech
Targets
-
-
Target
a3d145e3c72db7ea3e18a306410a0445222a8ce83235794dc404dd470843caf2
-
Size
771KB
-
MD5
061af339cbf1835f53f9b84ff1c49c21
-
SHA1
7da36c353e199e2c097233653d48b26ae3de0c43
-
SHA256
a3d145e3c72db7ea3e18a306410a0445222a8ce83235794dc404dd470843caf2
-
SHA512
ba657afd8c62539d93f696fcc0a2c0ea4315f5172592cdddbf9aae9f686d8193bad5a6419fd50d08df5fdb537f9ebaf3a5f61261f822b67f76695d0bf2dd9f42
-
SSDEEP
12288:4X3bbJTSjkURroDEor+HXtqbL2cikjfCYV:k3RInyysbL2cr
-
Formbook family
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1