Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 23:11

General

  • Target

    f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe

  • Size

    477KB

  • MD5

    f4891c4b2d5d817c50477bb8fa11c0a4

  • SHA1

    ce348c1ffa3a29ae6d318d9ab1f3fdede334e24a

  • SHA256

    598667091482e960508b94f2f46f6a6895afe071f3e37cd27cb4989865c2ee86

  • SHA512

    a545659229b733c74c7f402bcca6fe037ca53d11f4f07a2b62938474d2c22a5a9be77348967fb3a06ef6cd28dfd0da420b129a8c80d526e176c7d907c76f075e

  • SSDEEP

    6144:5JzKf/zmCja4qQmQCrcbnFuuUcTFx0T21BOcCSaa1MSSB6T1KpQcHCbhI:5JY1ja4qQ+rcbFudkuN/S/1MSSPQcHKa

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

fr

Decoy

geturstuff.life

kisakollections.com

bkipmtahuna.com

aoxou.com

thebigandfreeupdates.download

utvtribe.com

icontoken.com

naturexperience.com

h2sentertainmentcafe.com

careerproresumepa.com

franchiseindia.directory

psychouniversity.com

traveng.com

mylifestylebyclem.com

greentmraelty.com

imoneg.com

lupusrebelacademy.com

ghqxc.info

lylulidbd.com

dalfreestyle.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"
        3⤵
          PID:4688
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4520
          • C:\Users\Admin\AppData\Local\syscheck.exe
            "C:\Users\Admin\AppData\Local\syscheck.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3936
            • C:\Users\Admin\AppData\Local\syscheck.exe
              "C:\Users\Admin\AppData\Local\syscheck.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:4832
      • C:\Windows\SysWOW64\WWAHost.exe
        "C:\Windows\SysWOW64\WWAHost.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3748
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
            PID:4124

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\syscheck.exe

              Filesize

              477KB

              MD5

              f4891c4b2d5d817c50477bb8fa11c0a4

              SHA1

              ce348c1ffa3a29ae6d318d9ab1f3fdede334e24a

              SHA256

              598667091482e960508b94f2f46f6a6895afe071f3e37cd27cb4989865c2ee86

              SHA512

              a545659229b733c74c7f402bcca6fe037ca53d11f4f07a2b62938474d2c22a5a9be77348967fb3a06ef6cd28dfd0da420b129a8c80d526e176c7d907c76f075e

            • memory/2800-3-0x00000000053E0000-0x0000000005472000-memory.dmp

              Filesize

              584KB

            • memory/2800-11-0x00000000746C0000-0x0000000074E70000-memory.dmp

              Filesize

              7.7MB

            • memory/2800-0-0x0000000000980000-0x00000000009FE000-memory.dmp

              Filesize

              504KB

            • memory/2800-4-0x0000000002DC0000-0x0000000002DDC000-memory.dmp

              Filesize

              112KB

            • memory/2800-5-0x00000000055D0000-0x00000000055E0000-memory.dmp

              Filesize

              64KB

            • memory/2800-8-0x00000000746C0000-0x0000000074E70000-memory.dmp

              Filesize

              7.7MB

            • memory/2800-9-0x00000000055D0000-0x00000000055E0000-memory.dmp

              Filesize

              64KB

            • memory/2800-2-0x0000000005A60000-0x0000000006004000-memory.dmp

              Filesize

              5.6MB

            • memory/2800-1-0x00000000746C0000-0x0000000074E70000-memory.dmp

              Filesize

              7.7MB

            • memory/3328-44-0x0000000008D60000-0x0000000008E80000-memory.dmp

              Filesize

              1.1MB

            • memory/3328-41-0x0000000008D60000-0x0000000008E80000-memory.dmp

              Filesize

              1.1MB

            • memory/3328-40-0x0000000008D60000-0x0000000008E80000-memory.dmp

              Filesize

              1.1MB

            • memory/3328-36-0x0000000003230000-0x0000000003394000-memory.dmp

              Filesize

              1.4MB

            • memory/3328-28-0x0000000003230000-0x0000000003394000-memory.dmp

              Filesize

              1.4MB

            • memory/3748-29-0x0000000000140000-0x000000000021C000-memory.dmp

              Filesize

              880KB

            • memory/3748-34-0x0000000001190000-0x0000000001223000-memory.dmp

              Filesize

              588KB

            • memory/3748-38-0x00000000008A0000-0x00000000008CA000-memory.dmp

              Filesize

              168KB

            • memory/3748-33-0x0000000001320000-0x000000000166A000-memory.dmp

              Filesize

              3.3MB

            • memory/3748-32-0x00000000008A0000-0x00000000008CA000-memory.dmp

              Filesize

              168KB

            • memory/3748-31-0x0000000000140000-0x000000000021C000-memory.dmp

              Filesize

              880KB

            • memory/3936-19-0x0000000006050000-0x00000000060EC000-memory.dmp

              Filesize

              624KB

            • memory/3936-23-0x00000000746C0000-0x0000000074E70000-memory.dmp

              Filesize

              7.7MB

            • memory/3936-18-0x0000000005130000-0x0000000005140000-memory.dmp

              Filesize

              64KB

            • memory/3936-17-0x00000000746C0000-0x0000000074E70000-memory.dmp

              Filesize

              7.7MB

            • memory/3936-16-0x0000000005130000-0x0000000005140000-memory.dmp

              Filesize

              64KB

            • memory/3936-15-0x00000000746C0000-0x0000000074E70000-memory.dmp

              Filesize

              7.7MB

            • memory/4832-27-0x0000000000CA0000-0x0000000000CB4000-memory.dmp

              Filesize

              80KB

            • memory/4832-20-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/4832-26-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/4832-24-0x00000000011A0000-0x00000000014EA000-memory.dmp

              Filesize

              3.3MB