Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 23:11

General

  • Target

    f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe

  • Size

    477KB

  • MD5

    f4891c4b2d5d817c50477bb8fa11c0a4

  • SHA1

    ce348c1ffa3a29ae6d318d9ab1f3fdede334e24a

  • SHA256

    598667091482e960508b94f2f46f6a6895afe071f3e37cd27cb4989865c2ee86

  • SHA512

    a545659229b733c74c7f402bcca6fe037ca53d11f4f07a2b62938474d2c22a5a9be77348967fb3a06ef6cd28dfd0da420b129a8c80d526e176c7d907c76f075e

  • SSDEEP

    6144:5JzKf/zmCja4qQmQCrcbnFuuUcTFx0T21BOcCSaa1MSSB6T1KpQcHCbhI:5JY1ja4qQ+rcbFudkuN/S/1MSSPQcHKa

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

fr

Decoy

geturstuff.life

kisakollections.com

bkipmtahuna.com

aoxou.com

thebigandfreeupdates.download

utvtribe.com

icontoken.com

naturexperience.com

h2sentertainmentcafe.com

careerproresumepa.com

franchiseindia.directory

psychouniversity.com

traveng.com

mylifestylebyclem.com

greentmraelty.com

imoneg.com

lupusrebelacademy.com

ghqxc.info

lylulidbd.com

dalfreestyle.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"
        3⤵
          PID:4688
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4520
          • C:\Users\Admin\AppData\Local\syscheck.exe
            "C:\Users\Admin\AppData\Local\syscheck.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3936
            • C:\Users\Admin\AppData\Local\syscheck.exe
              "C:\Users\Admin\AppData\Local\syscheck.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:4832
      • C:\Windows\SysWOW64\WWAHost.exe
        "C:\Windows\SysWOW64\WWAHost.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3748
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
            PID:4124

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\syscheck.exe

        Filesize

        477KB

        MD5

        f4891c4b2d5d817c50477bb8fa11c0a4

        SHA1

        ce348c1ffa3a29ae6d318d9ab1f3fdede334e24a

        SHA256

        598667091482e960508b94f2f46f6a6895afe071f3e37cd27cb4989865c2ee86

        SHA512

        a545659229b733c74c7f402bcca6fe037ca53d11f4f07a2b62938474d2c22a5a9be77348967fb3a06ef6cd28dfd0da420b129a8c80d526e176c7d907c76f075e

      • memory/2800-3-0x00000000053E0000-0x0000000005472000-memory.dmp

        Filesize

        584KB

      • memory/2800-11-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/2800-0-0x0000000000980000-0x00000000009FE000-memory.dmp

        Filesize

        504KB

      • memory/2800-4-0x0000000002DC0000-0x0000000002DDC000-memory.dmp

        Filesize

        112KB

      • memory/2800-5-0x00000000055D0000-0x00000000055E0000-memory.dmp

        Filesize

        64KB

      • memory/2800-8-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/2800-9-0x00000000055D0000-0x00000000055E0000-memory.dmp

        Filesize

        64KB

      • memory/2800-2-0x0000000005A60000-0x0000000006004000-memory.dmp

        Filesize

        5.6MB

      • memory/2800-1-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/3328-44-0x0000000008D60000-0x0000000008E80000-memory.dmp

        Filesize

        1.1MB

      • memory/3328-41-0x0000000008D60000-0x0000000008E80000-memory.dmp

        Filesize

        1.1MB

      • memory/3328-40-0x0000000008D60000-0x0000000008E80000-memory.dmp

        Filesize

        1.1MB

      • memory/3328-36-0x0000000003230000-0x0000000003394000-memory.dmp

        Filesize

        1.4MB

      • memory/3328-28-0x0000000003230000-0x0000000003394000-memory.dmp

        Filesize

        1.4MB

      • memory/3748-29-0x0000000000140000-0x000000000021C000-memory.dmp

        Filesize

        880KB

      • memory/3748-34-0x0000000001190000-0x0000000001223000-memory.dmp

        Filesize

        588KB

      • memory/3748-38-0x00000000008A0000-0x00000000008CA000-memory.dmp

        Filesize

        168KB

      • memory/3748-33-0x0000000001320000-0x000000000166A000-memory.dmp

        Filesize

        3.3MB

      • memory/3748-32-0x00000000008A0000-0x00000000008CA000-memory.dmp

        Filesize

        168KB

      • memory/3748-31-0x0000000000140000-0x000000000021C000-memory.dmp

        Filesize

        880KB

      • memory/3936-19-0x0000000006050000-0x00000000060EC000-memory.dmp

        Filesize

        624KB

      • memory/3936-23-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/3936-18-0x0000000005130000-0x0000000005140000-memory.dmp

        Filesize

        64KB

      • memory/3936-17-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/3936-16-0x0000000005130000-0x0000000005140000-memory.dmp

        Filesize

        64KB

      • memory/3936-15-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/4832-27-0x0000000000CA0000-0x0000000000CB4000-memory.dmp

        Filesize

        80KB

      • memory/4832-20-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/4832-26-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/4832-24-0x00000000011A0000-0x00000000014EA000-memory.dmp

        Filesize

        3.3MB