Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 18:27

General

  • Target

    f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe

  • Size

    483KB

  • MD5

    f1b2c6c5ffb50b2f766def07f2bbc9f6

  • SHA1

    b41d589af7dcabab0010ad37616c8edf44af8675

  • SHA256

    d3a270f55d00796bc80858cfc07ee26458aa7f022664f8327b80a41adf900454

  • SHA512

    a3682b6345f0f8eff28ab2caa124a87ac10592bdbdf5c4d5cc8bddab06d873a5c13dabbc8146d1c24a6e7454b396dc3539488ea2e39df209097b35abd13ab9ff

  • SSDEEP

    6144:ZIFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9p:Uh8Mz+sv3y2N1xzAZprkmuN/SD5iKefT

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ow

Decoy

piavecaffe.com

jlxkqg.men

lifesavingfoundation.net

karadasama.net

michaeltraolach-macsweeney.com

thunderwatches.com

serviciocasawhirlpool.biz

c-cap.online

itparksolution.com

clarityhearingkw.com

wpgrosiri.date

colemarshalcambell.com

webperffest.com

adjusterforirma.info

buildersqq.com

spiritualwisdominindia.com

111222333.net

traditionalarabicdishes.com

hmlifi.com

receive-our-info-heredaily.info

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3460
    • C:\Users\Admin\AppData\Local\Temp\f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f1b2c6c5ffb50b2f766def07f2bbc9f6_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"
        3⤵
          PID:2816
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3164
          • C:\Users\Admin\AppData\Local\syscheck.exe
            "C:\Users\Admin\AppData\Local\syscheck.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2352
            • C:\Users\Admin\AppData\Local\syscheck.exe
              "C:\Users\Admin\AppData\Local\syscheck.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:1904
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\SysWOW64\cmd.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4400
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
            PID:2084
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3932,i,10943981808815347339,15838841970612097850,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:8
        1⤵
          PID:4156

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\syscheck.exe

          Filesize

          483KB

          MD5

          f1b2c6c5ffb50b2f766def07f2bbc9f6

          SHA1

          b41d589af7dcabab0010ad37616c8edf44af8675

          SHA256

          d3a270f55d00796bc80858cfc07ee26458aa7f022664f8327b80a41adf900454

          SHA512

          a3682b6345f0f8eff28ab2caa124a87ac10592bdbdf5c4d5cc8bddab06d873a5c13dabbc8146d1c24a6e7454b396dc3539488ea2e39df209097b35abd13ab9ff

        • memory/1904-27-0x00000000010E0000-0x00000000010F4000-memory.dmp

          Filesize

          80KB

        • memory/1904-20-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1904-24-0x0000000001210000-0x000000000155A000-memory.dmp

          Filesize

          3.3MB

        • memory/1904-26-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2352-17-0x0000000074EE0000-0x0000000075690000-memory.dmp

          Filesize

          7.7MB

        • memory/2352-15-0x0000000074EE0000-0x0000000075690000-memory.dmp

          Filesize

          7.7MB

        • memory/2352-16-0x00000000056B0000-0x00000000056C0000-memory.dmp

          Filesize

          64KB

        • memory/2352-23-0x0000000074EE0000-0x0000000075690000-memory.dmp

          Filesize

          7.7MB

        • memory/2352-18-0x00000000056B0000-0x00000000056C0000-memory.dmp

          Filesize

          64KB

        • memory/2352-19-0x0000000006390000-0x000000000642C000-memory.dmp

          Filesize

          624KB

        • memory/3460-28-0x00000000085E0000-0x0000000008774000-memory.dmp

          Filesize

          1.6MB

        • memory/3460-36-0x00000000085E0000-0x0000000008774000-memory.dmp

          Filesize

          1.6MB

        • memory/3460-40-0x0000000002E10000-0x0000000002EAB000-memory.dmp

          Filesize

          620KB

        • memory/3460-41-0x0000000002E10000-0x0000000002EAB000-memory.dmp

          Filesize

          620KB

        • memory/3460-44-0x0000000002E10000-0x0000000002EAB000-memory.dmp

          Filesize

          620KB

        • memory/3680-9-0x0000000005610000-0x0000000005620000-memory.dmp

          Filesize

          64KB

        • memory/3680-4-0x0000000002F40000-0x0000000002F5C000-memory.dmp

          Filesize

          112KB

        • memory/3680-1-0x0000000074EE0000-0x0000000075690000-memory.dmp

          Filesize

          7.7MB

        • memory/3680-8-0x0000000074EE0000-0x0000000075690000-memory.dmp

          Filesize

          7.7MB

        • memory/3680-5-0x0000000005610000-0x0000000005620000-memory.dmp

          Filesize

          64KB

        • memory/3680-0-0x0000000000990000-0x0000000000A0E000-memory.dmp

          Filesize

          504KB

        • memory/3680-2-0x0000000005A90000-0x0000000006034000-memory.dmp

          Filesize

          5.6MB

        • memory/3680-3-0x00000000053C0000-0x0000000005452000-memory.dmp

          Filesize

          584KB

        • memory/3680-11-0x0000000074EE0000-0x0000000075690000-memory.dmp

          Filesize

          7.7MB

        • memory/4400-34-0x0000000001090000-0x0000000001123000-memory.dmp

          Filesize

          588KB

        • memory/4400-33-0x0000000001250000-0x000000000159A000-memory.dmp

          Filesize

          3.3MB

        • memory/4400-38-0x0000000000550000-0x000000000057A000-memory.dmp

          Filesize

          168KB

        • memory/4400-32-0x0000000000550000-0x000000000057A000-memory.dmp

          Filesize

          168KB

        • memory/4400-31-0x0000000000A50000-0x0000000000AAA000-memory.dmp

          Filesize

          360KB

        • memory/4400-29-0x0000000000A50000-0x0000000000AAA000-memory.dmp

          Filesize

          360KB