Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_670cc1bb467dd19d3b038dd5338ce5fc7b315f755c7308ecbc14ca24867ab300.ps1
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_670cc1bb467dd19d3b038dd5338ce5fc7b315f755c7308ecbc14ca24867ab300.ps1
-
Size
1.5MB
-
MD5
7ee4c4cd163e4910cb1e5887c4c0547f
-
SHA1
6d63f1359fa12285fa0f5c22a0e6746548917688
-
SHA256
670cc1bb467dd19d3b038dd5338ce5fc7b315f755c7308ecbc14ca24867ab300
-
SHA512
61c7e86f9445fca7d8361f9ac7a39d45c40af528deaefde3a2ddc7b10b7361303f9db2cfd12af5faaf26bd05234b22adb4df3123c333694d9847b8bc8ce872c9
-
SSDEEP
12288:EFwbjfLo4CXHtMqQceGgZnqG7Que3y8utCfGclAXIc3BEHDEOh4XQ6i1Z2PNe3ES:ulskKetTn
Malware Config
Extracted
formbook
4.1
u3s4
treducation.net
picashowapk.com
puzzletourny.club
alleenas.com
xgyvsf.icu
valencia-noticias.com
xooxd.pet
kikimodel.com
familyfx.win
halosg.com
ishrcb.com
867537.icu
aadibhatt.net
purebloodbanks.com
zhongwentao.top
slot777dunia.com
lesbonbonsdemamiejeanne.com
prune.digital
zsyqfk.com
yamamichi-satoshi.com
dibesupply.com
million.shoes
choumiryou.biz
krogervouchersnow.cloud
robertgraam.com
isupportworldwidecom.com
golfcartsofcolorado.com
adlerorange.com
metalnstaqramdesstektelf.site
triplehretreats.com
rokiwuz.com
obsidiantoday.com
crismedinamusic.com
gebmop.online
mc66.club
onedaystaffing.agency
kobilabgt.com
reliantstores.com
elito.icu
imaginemallory.com
zmfgrcfpcpdkm.com
cestasbellatrix.com
siltexon.space
pinkmariekelleyonline.com
pdpassist.com
gddy.tech
consequentcompliance.com
tombroka.com
faturarealize-fevereiro.online
adfwre56ga.net
zerosuperhero.group
amazontype.com
educate-virtual.com
byleague.com
cranknationstudios.com
fredericklactation.com
propscuepartners.com
nr5k1.com
jewsforuyghurs.com
loseweight.expert
livelove4u.com
soloestabamirando.com
smartappagency.com
tipsyfoxcocktailbar.com
wanghumall.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2088-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2088-23-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2648-33-0x0000000000450000-0x000000000047F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1468 set thread context of 2088 1468 powershell.exe 83 PID 2088 set thread context of 3456 2088 Calc.exe 56 PID 2648 set thread context of 3456 2648 wlanext.exe 56 -
pid Process 1468 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1468 powershell.exe 1468 powershell.exe 1468 powershell.exe 1468 powershell.exe 2088 Calc.exe 2088 Calc.exe 2088 Calc.exe 2088 Calc.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe 2648 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2088 Calc.exe 2088 Calc.exe 2088 Calc.exe 2648 wlanext.exe 2648 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1468 powershell.exe Token: SeDebugPrivilege 2088 Calc.exe Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeDebugPrivilege 2648 wlanext.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1468 wrote to memory of 2088 1468 powershell.exe 83 PID 1468 wrote to memory of 2088 1468 powershell.exe 83 PID 1468 wrote to memory of 2088 1468 powershell.exe 83 PID 1468 wrote to memory of 2088 1468 powershell.exe 83 PID 1468 wrote to memory of 2088 1468 powershell.exe 83 PID 1468 wrote to memory of 2088 1468 powershell.exe 83 PID 3456 wrote to memory of 2648 3456 Explorer.EXE 84 PID 3456 wrote to memory of 2648 3456 Explorer.EXE 84 PID 3456 wrote to memory of 2648 3456 Explorer.EXE 84 PID 2648 wrote to memory of 4264 2648 wlanext.exe 87 PID 2648 wrote to memory of 4264 2648 wlanext.exe 87 PID 2648 wrote to memory of 4264 2648 wlanext.exe 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_670cc1bb467dd19d3b038dd5338ce5fc7b315f755c7308ecbc14ca24867ab300.ps12⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\WINDOWS\syswow64\Calc.exe"{Path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\WINDOWS\syswow64\Calc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82