Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_670cc1bb467dd19d3b038dd5338ce5fc7b315f755c7308ecbc14ca24867ab300.ps1
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_670cc1bb467dd19d3b038dd5338ce5fc7b315f755c7308ecbc14ca24867ab300.ps1
-
Size
1.5MB
-
MD5
7ee4c4cd163e4910cb1e5887c4c0547f
-
SHA1
6d63f1359fa12285fa0f5c22a0e6746548917688
-
SHA256
670cc1bb467dd19d3b038dd5338ce5fc7b315f755c7308ecbc14ca24867ab300
-
SHA512
61c7e86f9445fca7d8361f9ac7a39d45c40af528deaefde3a2ddc7b10b7361303f9db2cfd12af5faaf26bd05234b22adb4df3123c333694d9847b8bc8ce872c9
-
SSDEEP
12288:EFwbjfLo4CXHtMqQceGgZnqG7Que3y8utCfGclAXIc3BEHDEOh4XQ6i1Z2PNe3ES:ulskKetTn
Malware Config
Extracted
formbook
4.1
u3s4
treducation.net
picashowapk.com
puzzletourny.club
alleenas.com
xgyvsf.icu
valencia-noticias.com
xooxd.pet
kikimodel.com
familyfx.win
halosg.com
ishrcb.com
867537.icu
aadibhatt.net
purebloodbanks.com
zhongwentao.top
slot777dunia.com
lesbonbonsdemamiejeanne.com
prune.digital
zsyqfk.com
yamamichi-satoshi.com
dibesupply.com
million.shoes
choumiryou.biz
krogervouchersnow.cloud
robertgraam.com
isupportworldwidecom.com
golfcartsofcolorado.com
adlerorange.com
metalnstaqramdesstektelf.site
triplehretreats.com
rokiwuz.com
obsidiantoday.com
crismedinamusic.com
gebmop.online
mc66.club
onedaystaffing.agency
kobilabgt.com
reliantstores.com
elito.icu
imaginemallory.com
zmfgrcfpcpdkm.com
cestasbellatrix.com
siltexon.space
pinkmariekelleyonline.com
pdpassist.com
gddy.tech
consequentcompliance.com
tombroka.com
faturarealize-fevereiro.online
adfwre56ga.net
zerosuperhero.group
amazontype.com
educate-virtual.com
byleague.com
cranknationstudios.com
fredericklactation.com
propscuepartners.com
nr5k1.com
jewsforuyghurs.com
loseweight.expert
livelove4u.com
soloestabamirando.com
smartappagency.com
tipsyfoxcocktailbar.com
wanghumall.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2212-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2212-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2900-31-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3056 set thread context of 2212 3056 powershell.exe 31 PID 2212 set thread context of 1200 2212 Calc.exe 21 PID 2900 set thread context of 1200 2900 netsh.exe 21 -
pid Process 3056 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 3056 powershell.exe 3056 powershell.exe 3056 powershell.exe 2212 Calc.exe 2212 Calc.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe 2900 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2212 Calc.exe 2212 Calc.exe 2212 Calc.exe 2900 netsh.exe 2900 netsh.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3056 powershell.exe Token: SeDebugPrivilege 2212 Calc.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeDebugPrivilege 2900 netsh.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2212 3056 powershell.exe 31 PID 3056 wrote to memory of 2212 3056 powershell.exe 31 PID 3056 wrote to memory of 2212 3056 powershell.exe 31 PID 3056 wrote to memory of 2212 3056 powershell.exe 31 PID 3056 wrote to memory of 2212 3056 powershell.exe 31 PID 3056 wrote to memory of 2212 3056 powershell.exe 31 PID 3056 wrote to memory of 2212 3056 powershell.exe 31 PID 1200 wrote to memory of 2900 1200 Explorer.EXE 33 PID 1200 wrote to memory of 2900 1200 Explorer.EXE 33 PID 1200 wrote to memory of 2900 1200 Explorer.EXE 33 PID 1200 wrote to memory of 2900 1200 Explorer.EXE 33 PID 2900 wrote to memory of 2904 2900 netsh.exe 34 PID 2900 wrote to memory of 2904 2900 netsh.exe 34 PID 2900 wrote to memory of 2904 2900 netsh.exe 34 PID 2900 wrote to memory of 2904 2900 netsh.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_670cc1bb467dd19d3b038dd5338ce5fc7b315f755c7308ecbc14ca24867ab300.ps12⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\WINDOWS\syswow64\Calc.exe"{Path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2880
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\WINDOWS\syswow64\Calc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-