General
-
Target
JaffaCakes118_489fa719739ec1613adea999befb747412438ad80d401908f9c52fa351e36941
-
Size
663KB
-
Sample
241225-y73vvswnaz
-
MD5
91b5b93c27d5169f4a4d4fa61b2f41a3
-
SHA1
a7a6343799a214a47eb90267fd31278bc6150a54
-
SHA256
489fa719739ec1613adea999befb747412438ad80d401908f9c52fa351e36941
-
SHA512
e3b8965c491811df7181aa104b70fb056a6be11176e1bf5f701c5e47b12a554fa0629ec97965c2b62975dd8db5904667c6ce7f515e6fe4638ccc911eaf1c0c2f
-
SSDEEP
12288:d2GKJBPq9QGCtKmAPyoXp9I8r2IqGGJnBR2nACFbSyLcMEdaxlqBMdl9ko02x/X:d2GKu9QTtHAyoXpLr2RJBVeSyLcMJfk2
Static task
static1
Behavioral task
behavioral1
Sample
New Order WID-12874 (VT-10622)_SCHW_Juni 22.exe
Resource
win7-20241010-en
Malware Config
Extracted
formbook
4.1
t19g
playstationspiele.com
cakesbyannal.com
racepin.space
anti-offender.com
magnetque.com
farragorealtybrokerage.com
khuludmohammed.com
v33696.com
84ggg.com
d440.com
soccersmarthome.com
ofthis.world
fivestaryardcards.com
lusyard.com
gghft.com
viajesfortur.com
rationalirrationality.com
hanaramenrestaurant.com
exactlycleanse.com
martensenargentina.com
michellesellsvt.com
pupsloveandlondon.com
kfhym.world
makeuphoje.com
ebookrise.com
flesherbrothers.com
doonaudio.com
doanet.xyz
wrghintlian.com
davidchristl.com
domaintch.com
quotereflection.com
eroptikblog.xyz
iranianinvestmentclub.com
cp200motorola.com
vsenq.com
theamazonmovement.com
aspiteksoln.com
perkebunannews.com
myreverie.life
hrddf.com
gblaincreative.com
lipsstreet.com
xxf76.top
dureluxx.com
heldelicioso.com
taskconsulting.com
dongcunzhengfu.com
itohpe.com
abundantskill.com
fernhutco.com
hairgrowthxpert.com
intelligentreportscloud.com
maybesupply.com
7156.world
cr-marcelo.com
shequipamentos.com
villeenvie.net
robbyscreations.com
mpaohead.com
nailsa.biz
accoladesandmore.com
preppers.pro
pinpinduo2.xyz
allsofttech.com
Targets
-
-
Target
New Order WID-12874 (VT-10622)_SCHW_Juni 22.bin
-
Size
709KB
-
MD5
32613271f1feb2834ac33ea16807496f
-
SHA1
40cde9168a856b0b0b05727cffb6977a641b2274
-
SHA256
fca8d992734405f7ad3c622fa1f990f7b0e1b3949b6a174ad5b1f8a929f93dc9
-
SHA512
52fb48e81672996925385d681c30aca3d59e9f29b6737caf440461cdf181d7f384bc62b56759bf08be1fa875fd756437e511c39408a8477516422cb4859c0170
-
SSDEEP
12288:VNC2RmaGseL5pRuAoeOAGQbd5Y48dlDCKb2gb3IU3ScaFlSNS:Vs2RzPo5oeOAh382S9VaQS
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1