Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 05:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe
-
Size
1.0MB
-
MD5
efdae08118be99a41dddcfb0918d3f42
-
SHA1
ce3d1472b1f754e5ec0123ecb4d87ccc03e3121b
-
SHA256
9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d
-
SHA512
840c4c1e0f57d00bbb788e2529d95f12b526c6bc75a1a73a50b65a6442306465299c009a50dffae127f70d5178bc4c24866a63f495fd91cd7c3b56c77516b603
-
SSDEEP
12288:LAGApB+LGjzOQWOxxnDC7nVD4BIaFFEnd0XZ3lvMgTADqjJ5n+pUJj3seT0Ciw2j:LArpBSCWXrV0od0/Vrjr+gK
Malware Config
Extracted
formbook
pcbd
zmUiPvT3GhgT0MCJ0cfkdEhzgw==
yysIUP08pEEFmg==
OJocz3OwWxa3dlw=
x2zXJcwJW4ov1HTk6fxkGhA=
sBLZbXS1UNRrKtXRVg==
J7Gg45CjxQ2yXGVNjhW+dGl6PjA=
oSLxdZGii2ZZLxbgL/pUqQ==
2G7zNzNizyjjeRKY3gb29GOeiJsHWraj
X+hZnXgqSha3dlw=
8QPQWQkxuy0j2HtGXkIm
T6BRyfomMTvOiYQU
ovrVJa7GS9a4cnAsW6YEGrI6
4oqCON+BsDIPjQ==
4HZHw9TpIMrFkA==
LELMEKLXyAL4mA==
yuKpL7C5UQB4bHFYnOMu
ZYcWydXqPiqQq1wIGdA=
Y3EsQV5+IYd3NuyDi/2avRg=
4LRr6nWZPJunXDsCKmrNb2UIogogQg==
AA4kD8BCSxa3dlw=
wMdAhREu11RRRem1SQ==
oCa06gs43lcAj4hytmaVu6E2
RJwtSd7zbcSTI0EnZxNqPAnxF7h/Sg==
53QaqL/xHAjJnRjHUA==
16hT3XbCqACNflwIfhRvx1sgCjI=
uCY0e6TN9xa3dlw=
ZvbBQ2Om0dLbjUI2aTQx
VV5IA5OoPaJV8sSFmVt43bM0
DmjzPWJ9JJuOKRrYVuQ/h/yX8WZZOZTrsg==
dlLRGqH1Yd6/Rx7nL/pUqQ==
+3n9NUZQ71Ef1IRGXkIm
9Vv1Q1pjSiPYdBuR75D3irQuiw==
oDAiOxdD43MzzYdGXkIm
qgOeMEE5VFsyycZipvyVz7Q8
/lQLh6O4Gse9cVQ=
Qd08vVN/Io+IMybkL/pUqQ==
ttZitEBO82wv1n9GXkIm
PRuq5IGoxdRZLQy4S+o+29Vuz2dUOZTrsg==
iqo/dhY5pvTJnRjHUA==
6D6w+RRBY0Ic1MZrcCF+oTsYHzg=
a4NqIdVEqyP1
F6APXXW3MYUC4n4D
l17/dgot1VJHChHPUwBa/OefpYy4
z1jdL/5NOg==
tgrxM+QjowfFUuNrtwCVz7Q8
8FTzdZm5omc82NubEho9a0HBI82w
MzQGhxsht0EOw4RGXkIm
+lTWCztM52RBA8i4+OOsCRA=
rDUFiai319K5iQSz+zQg
aLqO0W+4B/TchkI2aTQx
ytqjMcv3MsGib14=
m3ksrV138UXOiYQU
u8uYHNBEqyP1
A24ES2R3F41qGfzIT0EovbBg+i4lSA==
aXT3K9zx3dKmMP6uKbT/irQuiw==
A+hbrkNU+HuDOCwazGOw9XQIogogQg==
E5hI4vgkjDUk65oGWA==
CRij6IntxaifnRjHUA==
wR7KUWmiHYEC4n4D
L71mfxxJpEEFmg==
LQmuL8Xvof3PdkjHAdgxO5iwhpgHWraj
MTwujZHQ69nGjIRzyRt23PIVJMiBSg==
nrBx6EyxJXIC4n4D
XjgHgyVQ8a5B23cB
mihoyobbs.com
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1976 set thread context of 2812 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2744 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 2812 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2744 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 30 PID 1976 wrote to memory of 2744 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 30 PID 1976 wrote to memory of 2744 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 30 PID 1976 wrote to memory of 2744 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 30 PID 1976 wrote to memory of 2812 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 32 PID 1976 wrote to memory of 2812 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 32 PID 1976 wrote to memory of 2812 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 32 PID 1976 wrote to memory of 2812 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 32 PID 1976 wrote to memory of 2812 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 32 PID 1976 wrote to memory of 2812 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 32 PID 1976 wrote to memory of 2812 1976 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PyxGxWvHkeU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp94B1.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55e7383194a0885ed720faa861371bfbc
SHA123417d7cf6280e1cf50767fe1a61c8431df40b00
SHA2566ff1a03b1917f44996f96872ffe550b79187da05e11b0a527d67a1e5692e5bc3
SHA5127037b4b988b2bbd9cfab8234d6dcc7c332a5223434559b9c4fe5e5d101a5040b495090436dae544a4fdcbdc18efae4cfd6d4a0838f707915bc2185ddc3db19de