Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 07:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe
-
Size
658KB
-
MD5
95fa1b0ecaaf1530a49fc9983aaf3e75
-
SHA1
50817e76ad62be263ed57337f0bdeb56d9cf89c4
-
SHA256
4302ab0f740b3950f47a0cbd76e75681a6d3118ac97154450a2daf258fa70db5
-
SHA512
0ecfcbde9d23dcb67823793f03f3488cb938414e7a7a77c0dcfd4d6b019b2c1ec4ebf6e8a54d606882b65479f5df0567f7ec12ede9fe51beb7e45912d2d01a87
-
SSDEEP
12288:EGokEm1c6UrKyP5mRTsT52MMMMMMMMMMMuMMMMMMMMMMMMMMMMMMMMMMMMMMMMMt:EGTEm1c3KychsT52MMMMMMMMMMMuMMMn
Malware Config
Extracted
formbook
4.1
g8ni
nickmowat.com
garethjame.biz
colibrilift.com
vulnerabilitylabs.one
neuro-ai-web-ru.website
16mcnaestreetmooneeponds.com
bestofstmaarten.net
meditelier.com
ragnarduke.com
escueladecampo.com
vongtayvn.com
inmemoriamaan.com
yourpeoplemanager.com
r6-gytr.com
agreeablebeauty.com
snpconfirms.com
tribalurq.quest
purafuse.com
cisco-training-course.com
wery.top
haiyaa.tech
schtefo.net
kenytc.com
energypopcorn.com
0urls.top
artiatec.com
enqum.com
nextcloud.solutions
stateaffairsng.com
727bpay.com
matchmakerfiji.com
qingdouge.com
nusrattelbdoffical.xyz
seo-clicks7.com
aspirateurs.net
autosandmorestore.com
moje-akvarium.net
uehddw.com
geschmacksakademie.com
gendarmerie.email
buynftinc.com
mission-nao.com
webmakers.xyz
federationwholesale.com
tjbieying.com
finestpoints.com
premiersloyko.xyz
carlislepartssurvey.com
hackernfts.com
abitvip.com
iphone13mini.supplies
thenorthfacedeal.online
swlhvipbj.com
elguije.com
auto2pl.com
route112mitsubishi.com
zilliq.com
pumateam04.com
xtzztf.com
sacmaudantoc.xyz
kalafwalker.com
jumeaux-numeriques.com
purposefulwork.com
jacquelineblog.info
er5544.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2820-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1684 set thread context of 2820 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 2820 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2968 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 31 PID 1684 wrote to memory of 2968 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 31 PID 1684 wrote to memory of 2968 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 31 PID 1684 wrote to memory of 2968 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 31 PID 1684 wrote to memory of 2820 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 33 PID 1684 wrote to memory of 2820 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 33 PID 1684 wrote to memory of 2820 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 33 PID 1684 wrote to memory of 2820 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 33 PID 1684 wrote to memory of 2820 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 33 PID 1684 wrote to memory of 2820 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 33 PID 1684 wrote to memory of 2820 1684 JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BeTfdNTSbqtI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp43C4.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95fa1b0ecaaf1530a49fc9983aaf3e75.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-