General
-
Target
JaffaCakes118_166fbb921baab1b4280ae9d35aaf9664febccce0029eed19cbecfde83d98e0c2
-
Size
480KB
-
Sample
241222-a31b6swmcy
-
MD5
92f7c6ba25e705e8e73373496308cc43
-
SHA1
d526242fcca9b55616b53e9cc33ca440e035b8e5
-
SHA256
166fbb921baab1b4280ae9d35aaf9664febccce0029eed19cbecfde83d98e0c2
-
SHA512
937cbfecccce9e8dea87e85a8026489b8c7caf1a9a40f287296581f0cc065204a8c43e1537949c48c552a696fa4d628b9b5e8e4230ac7fe1bd81023c0ebee948
-
SSDEEP
12288:b1dlT2N8DqnNIfwkLkbDzE9LBC+3IxSL5SstgNj3RXR:b1HOuEWIWkra3/L9WJBh
Static task
static1
Behavioral task
behavioral1
Sample
5227918355b47bf8f0cf6eabb0628ff59339d6fd6a3a56ceca4dcefd06dd8d00.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
cfvc
qFcyI8OAPHKap6ubfQ==
NuOCNnr/zOqy1xM5AN4=
CnHfypZMLKQKgKaaVw4J1g==
9WpDFnsiwEyoFko7+GYiyo55
zUKhZPi3f21+ux+L
vqqeiTTPlz+cnQaD
GLGZh9zop+UvsCtBEm9x
eCUGyUEAe9hmj8KgaA==
EvXUn0s63zJyoxQfCGQmMZRu
kVy6iO/FuRGD/A==
+tg0M82KQk7fX4XXoYIluHMEFhbrzMk=
hP/nqutI9DR+0mBnYA==
cwrq1kLJd9QzqtQq9QCc7hHV9FjjKSvU
eE6vlcLHxAHZ7g==
vpKQL84+30y4SZpU/Ox5
vbfnlWZmAj1aVbCdbA==
UNQwEfT8tzbiL3J2Wrjm3g==
02LLqYRY9SeDIHwK5pFjYrg=
PhkLzj8IuT6R7v3lxlBYwqO69HReqnrF
mkYwC5lsF6cDS6RU/Ox5
1egU0tEWDQZP4Q==
j2hZM5oc3kuPqgtxdw==
ceTIuEIUsSqC1+kg0DN357A=
0n3Tv+je3uk1uPJ2UCeiBsWBroDfJ7bf
hgHg0mI184XD+2HFnlVUNK8=
zVhUFCJH0xh00mBnYA==
0JhxOe3ytCRhyfjJVw4J1g==
WwLp1zuiQYGcnQaD
x39kI22vp+a0
WAr3xT8KyvPACx4FqUhkPqU=
X+bPkcY70A0oFQcG+m1x
ewR0bXi8fMYZkqubVw4J1g==
vUgh8nUYreg2t9ppSTDRNj216pc=
ey2Fa74m0WOr4AcR4dY=
O/b2teB5XDwgSID94pFjYrg=
II5sV7MarwZFXKoOEHFx
knDWptRdEGBPoLCeVw4J1g==
/oiISUVo+yTt0mBnYA==
JgTr0m7TrMqp
95qEXdpyGYbuaoDblmvOhWJk
X4plwqU17S2xDSQ=
DqIBzM4G0zN/+xovDWciyo55
XEAaCx5Oz/DaKSOZh2n5Chw6anyZ1mTG5w==
GfzORwwFDQZP4Q==
NejQnRiIqch90mBnYA==
p28NrwJ8FC2xDSQ=
uUu3mq7RWJTeXHtsUrndrD216pc=
rEOem/FY+yQAH15sUcDQnl3A1I4=
WA+HZENXPUKK/w==
IfsfZRUUGmKywQp/Nm/iOjPQLwytFA==
+OW+RRAHDQZP4Q==
OuZOFzi2R3ucnQaD
Z+pRRCYe6gvvO0Ym4E1Tvn44uy+8
ihkH5xZaF1y2SJalVw4J1g==
3VLCoGuDY1inTTw=
LA3nunIjBF+g
8rwsCO4H70CbCiw=
+2phRZUq3BnyL5dU/Ox5
y6SOR85wEWKxR5xU/Ox5
74Dvum5h/jo3rxM5AN4=
iXZg793elQ6cnQaD
fx6DZlZJInbJSV66eCMJdT/zC58=
uXnhoI/On/A50C0hzeZ+c7o=
9pKOGVH0o0E=
creativepediatric.com
Targets
-
-
Target
5227918355b47bf8f0cf6eabb0628ff59339d6fd6a3a56ceca4dcefd06dd8d00.exe
-
Size
519KB
-
MD5
ac506b9b66dfac14f67ca92c679d85bd
-
SHA1
bb39da67bac5c77002c3d88e80888786fcd83acd
-
SHA256
5227918355b47bf8f0cf6eabb0628ff59339d6fd6a3a56ceca4dcefd06dd8d00
-
SHA512
0a92d007ae6331fd4b9fc8f037b9581fb051ba63fefe0b8f1f74f799885875597b53a579e0c6e7273e336b7de3197c3d4ca92ddce3c45bddde25ebb529464834
-
SSDEEP
12288:yybs6xoSoNgO7lTPf5aJgGkwuV49WXnX8kp07kyLL1XXMQ+/8+:FNxY3aNkwuV4OqoyLJnMi
-
Formbook family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-