Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_187fda2b830429934ff2d59c014f05098bfb323d639be258f075efa4309f5c0f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xscfbjx.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
xscfbjx.exe
Resource
win10v2004-20241007-en
General
-
Target
xscfbjx.exe
-
Size
74KB
-
MD5
08b101029a510d1467056305f8bda101
-
SHA1
938d534e3584b132ece92f01e0089304b9587803
-
SHA256
3d897c1632a6234082cafef209af7ddb9f91a0af33b03e6d004e153a54d622c0
-
SHA512
631cc7c7a08b9492661983200ecc9b96c2d958d756808ed8b5b431a1a29ec92d360866c41c5d8307a3d185bcdedb4e66d661ec812d47d1ae057013a8cbc0ccbd
-
SSDEEP
1536:xjLDJzMtIyKhdKim2R44oQWUs5PRoMLEEpt8vTlJssWXcd5CM+ea:xmIyKhwxQWUs5PRoMLBylh5CMXa
Malware Config
Extracted
formbook
fkku
ItLUfbYmkw6ODl8lnvwkR/8=
oUKMUSjydqzVWxG/CqjK3ngAhQ==
HB9lfRtFwT/XlJ9Lxw==
hBYXuorq7a3WwPq1NSezCMStlQ==
ciRqfQbLgwx/+e2rLqTZ8oMLc2LYY4o=
9vb76Nc8JzKlj4YEQyPAx2dx86U=
fB9041xJgwl1
ND8juoNyH6x5XqlZ2Q==
QEaot04y8XLjFOBp1Cg=
SG6vmdmmpmFmDosczg==
WWCorUT756r1F+aD3cd7Cij6nSFQ
Yl63zVL2NnFph44XcKkiP/k=
s2RfFNOd3fuBEJNZ2ig=
u1p6Ucr2uCketwGD
0vD8lFkSfRCHEJdebbrb
qzlqgxrsrDRmDosczg==
H5aTYXc2rHXjzQ==
S/pFbexYx0S+Ex7SN5rC
9kOIkRTWkA136nA2Ua/R
ojOElJ50E1N40ZNanCbEZw==
M9rnjMSmZiRSZcA=
84iDJl8exTuvKJ9ebbrb
ojKRZBuMgtAXEGtl0Q==
fYjH5/XDCxSLK59f7SG7iphglaRY
jDhH568s83sCTZxeXT3ZcA==
+aX2yx/k453OLrdq+Y3/CeA=
dYKtPYJHN1vSzs86aI3/CeA=
JdDfj861c+9v8DbQRzc=
+YTsEh3zpP04sWsVKB87P6p/sJFKaw==
9Y6NKXk1J4TGqdw=
HENKJqo5afVt
0mJvDeJIOT12i24nwA==
r+RRbqgBgPtw
jp/W8PnXi9/Wk14pxA==
Js4O3DcODcr98D8ZTSvZ5FdNmhCyQoI=
ZPw/M2tGV5BMWlvfJyI=
wFGm1VFHB1xmDosczg==
7h4tyxWW06b/0aobVY3/CeA=
xcgqA0wwV3kCQ4pNd0DVdA==
k9jsiD3AvtE0Ci1eXT3ZcA==
IjGAlC8dTnTwwwHH3acsRVfm0e6EasRsiA==
7fc+SNO3873Kig91mGIBoADAlA==
gJzuvRVmJSxP3Xn8N21/ECb6nSFQ
rMcgQ8eANbxDpWImqfWjAL6hjQ==
n8rVcLcMhA9164ExqwcpyLutoSRaeIBciw==
KTBeLP/AQ4G3XqlZ2Q==
8hgbtW8xq90PjVUbLgxpAL6hjQ==
3nOhrT8o6VzPRdacl3Uwzwur
XXTB3mUo3i1PNHdhk2ZuBSH6nSFQ
awheOZJfU2f05jksZ43/CeA=
V+bzl+OXmmBmDosczg==
A4yhd3vFweVmTUIvPSA=
jRRnlZT27AV9QT1uvw85PbWLsJFKaw==
QF9Z8bKtU+QetwGD
ED1tiUaJjjN6
I8jGXSN/rHXjzQ==
tcjg0tu/BwMqRms1wA==
t2xtIt+r7QmIhJmKxxfQbw==
lRgQruqysfJjsV4hSyXTWnc6ydiJp79w
pjxP5bAs8nm2dwSJ
0PP0u0gTyknCB1fgK3evTmj17KU/YQ==
kzxi/wlC/1CLlKKjIo7G
V2rO9oVG9GzZNMScl3Uwzwur
53TKl/BQzFG3Kp9ebbrb
mariefrank.shop
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\Geo\Nation xscfbjx.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1852 set thread context of 2316 1852 xscfbjx.exe 30 PID 2316 set thread context of 1240 2316 xscfbjx.exe 21 PID 2316 set thread context of 1240 2316 xscfbjx.exe 21 PID 2132 set thread context of 1240 2132 raserver.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xscfbjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2316 xscfbjx.exe 2316 xscfbjx.exe 2316 xscfbjx.exe 2316 xscfbjx.exe 2316 xscfbjx.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe 2132 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2316 xscfbjx.exe 2316 xscfbjx.exe 2316 xscfbjx.exe 2316 xscfbjx.exe 2132 raserver.exe 2132 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2316 xscfbjx.exe Token: SeDebugPrivilege 2132 raserver.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2316 1852 xscfbjx.exe 30 PID 1852 wrote to memory of 2316 1852 xscfbjx.exe 30 PID 1852 wrote to memory of 2316 1852 xscfbjx.exe 30 PID 1852 wrote to memory of 2316 1852 xscfbjx.exe 30 PID 1852 wrote to memory of 2316 1852 xscfbjx.exe 30 PID 1240 wrote to memory of 2132 1240 Explorer.EXE 31 PID 1240 wrote to memory of 2132 1240 Explorer.EXE 31 PID 1240 wrote to memory of 2132 1240 Explorer.EXE 31 PID 1240 wrote to memory of 2132 1240 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\xscfbjx.exe"C:\Users\Admin\AppData\Local\Temp\xscfbjx.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\xscfbjx.exe"C:\Users\Admin\AppData\Local\Temp\xscfbjx.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2132
-