Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 23:11

General

  • Target

    f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe

  • Size

    477KB

  • MD5

    f4891c4b2d5d817c50477bb8fa11c0a4

  • SHA1

    ce348c1ffa3a29ae6d318d9ab1f3fdede334e24a

  • SHA256

    598667091482e960508b94f2f46f6a6895afe071f3e37cd27cb4989865c2ee86

  • SHA512

    a545659229b733c74c7f402bcca6fe037ca53d11f4f07a2b62938474d2c22a5a9be77348967fb3a06ef6cd28dfd0da420b129a8c80d526e176c7d907c76f075e

  • SSDEEP

    6144:5JzKf/zmCja4qQmQCrcbnFuuUcTFx0T21BOcCSaa1MSSB6T1KpQcHCbhI:5JY1ja4qQ+rcbFudkuN/S/1MSSPQcHKa

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

fr

Decoy

geturstuff.life

kisakollections.com

bkipmtahuna.com

aoxou.com

thebigandfreeupdates.download

utvtribe.com

icontoken.com

naturexperience.com

h2sentertainmentcafe.com

careerproresumepa.com

franchiseindia.directory

psychouniversity.com

traveng.com

mylifestylebyclem.com

greentmraelty.com

imoneg.com

lupusrebelacademy.com

ghqxc.info

lylulidbd.com

dalfreestyle.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"
        3⤵
          PID:2848
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2372
          • C:\Users\Admin\AppData\Local\syscheck.exe
            "C:\Users\Admin\AppData\Local\syscheck.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2484
            • C:\Users\Admin\AppData\Local\syscheck.exe
              "C:\Users\Admin\AppData\Local\syscheck.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:2348
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\SysWOW64\svchost.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
            PID:1708

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\syscheck.exe

              Filesize

              477KB

              MD5

              f4891c4b2d5d817c50477bb8fa11c0a4

              SHA1

              ce348c1ffa3a29ae6d318d9ab1f3fdede334e24a

              SHA256

              598667091482e960508b94f2f46f6a6895afe071f3e37cd27cb4989865c2ee86

              SHA512

              a545659229b733c74c7f402bcca6fe037ca53d11f4f07a2b62938474d2c22a5a9be77348967fb3a06ef6cd28dfd0da420b129a8c80d526e176c7d907c76f075e

            • memory/1324-29-0x00000000037D0000-0x00000000038D0000-memory.dmp

              Filesize

              1024KB

            • memory/1324-38-0x0000000006BF0000-0x0000000006D94000-memory.dmp

              Filesize

              1.6MB

            • memory/1324-30-0x0000000006BF0000-0x0000000006D94000-memory.dmp

              Filesize

              1.6MB

            • memory/2276-40-0x0000000000080000-0x00000000000AA000-memory.dmp

              Filesize

              168KB

            • memory/2276-36-0x0000000000520000-0x00000000005B3000-memory.dmp

              Filesize

              588KB

            • memory/2276-34-0x00000000008D0000-0x0000000000BD3000-memory.dmp

              Filesize

              3.0MB

            • memory/2276-33-0x0000000000080000-0x00000000000AA000-memory.dmp

              Filesize

              168KB

            • memory/2276-32-0x0000000000730000-0x0000000000738000-memory.dmp

              Filesize

              32KB

            • memory/2276-31-0x0000000000730000-0x0000000000738000-memory.dmp

              Filesize

              32KB

            • memory/2348-28-0x0000000000140000-0x0000000000154000-memory.dmp

              Filesize

              80KB

            • memory/2348-27-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/2348-25-0x0000000000BC0000-0x0000000000EC3000-memory.dmp

              Filesize

              3.0MB

            • memory/2348-18-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/2348-19-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/2348-20-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2348-22-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/2484-12-0x0000000074610000-0x0000000074CFE000-memory.dmp

              Filesize

              6.9MB

            • memory/2484-16-0x00000000048C0000-0x0000000004900000-memory.dmp

              Filesize

              256KB

            • memory/2484-15-0x0000000074610000-0x0000000074CFE000-memory.dmp

              Filesize

              6.9MB

            • memory/2484-14-0x00000000048C0000-0x0000000004900000-memory.dmp

              Filesize

              256KB

            • memory/2484-13-0x0000000000360000-0x00000000003DE000-memory.dmp

              Filesize

              504KB

            • memory/2484-24-0x0000000074610000-0x0000000074CFE000-memory.dmp

              Filesize

              6.9MB

            • memory/2772-0-0x0000000000C60000-0x0000000000CDE000-memory.dmp

              Filesize

              504KB

            • memory/2772-11-0x0000000074610000-0x0000000074CFE000-memory.dmp

              Filesize

              6.9MB

            • memory/2772-7-0x0000000000AD0000-0x0000000000B10000-memory.dmp

              Filesize

              256KB

            • memory/2772-6-0x0000000074610000-0x0000000074CFE000-memory.dmp

              Filesize

              6.9MB

            • memory/2772-3-0x0000000000AD0000-0x0000000000B10000-memory.dmp

              Filesize

              256KB

            • memory/2772-2-0x0000000000710000-0x000000000072C000-memory.dmp

              Filesize

              112KB

            • memory/2772-1-0x0000000074610000-0x0000000074CFE000-memory.dmp

              Filesize

              6.9MB