Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 11:14

General

  • Target

    f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe

  • Size

    483KB

  • MD5

    f7e16970e5f6aec9ed1fb634bfee3269

  • SHA1

    f939bfe961ac41b7a35f7763398d18248ffdf965

  • SHA256

    1f7b393e44ad6fcc5273bd57a21db95f4f20ca715cab20157455edd05f87f672

  • SHA512

    270f06a3ae1e17fe7db5e40c98b14d1f0be29f94921c6c357fc26be93d577d4e8564320ef010eceabfe4a9790fa9a2bcc0a5bebaf51e30b0cdd314a096e0779d

  • SSDEEP

    6144:5IFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9B:0h8Mz+sv3y2N1xzAZprkmuN/SD5iKefz

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ow

Decoy

piavecaffe.com

jlxkqg.men

lifesavingfoundation.net

karadasama.net

michaeltraolach-macsweeney.com

thunderwatches.com

serviciocasawhirlpool.biz

c-cap.online

itparksolution.com

clarityhearingkw.com

wpgrosiri.date

colemarshalcambell.com

webperffest.com

adjusterforirma.info

buildersqq.com

spiritualwisdominindia.com

111222333.net

traditionalarabicdishes.com

hmlifi.com

receive-our-info-heredaily.info

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\AppData\Local\Temp\f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f7e16970e5f6aec9ed1fb634bfee3269_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"
        3⤵
          PID:1884
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2476
          • C:\Users\Admin\AppData\Local\syscheck.exe
            "C:\Users\Admin\AppData\Local\syscheck.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2444
            • C:\Users\Admin\AppData\Local\syscheck.exe
              "C:\Users\Admin\AppData\Local\syscheck.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:2616
      • C:\Windows\SysWOW64\wininit.exe
        "C:\Windows\SysWOW64\wininit.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
            PID:268

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • \Users\Admin\AppData\Local\syscheck.exe

              Filesize

              483KB

              MD5

              f7e16970e5f6aec9ed1fb634bfee3269

              SHA1

              f939bfe961ac41b7a35f7763398d18248ffdf965

              SHA256

              1f7b393e44ad6fcc5273bd57a21db95f4f20ca715cab20157455edd05f87f672

              SHA512

              270f06a3ae1e17fe7db5e40c98b14d1f0be29f94921c6c357fc26be93d577d4e8564320ef010eceabfe4a9790fa9a2bcc0a5bebaf51e30b0cdd314a096e0779d

            • memory/1064-34-0x0000000000090000-0x00000000000AA000-memory.dmp

              Filesize

              104KB

            • memory/1064-35-0x0000000000090000-0x00000000000AA000-memory.dmp

              Filesize

              104KB

            • memory/1064-36-0x00000000000F0000-0x000000000011A000-memory.dmp

              Filesize

              168KB

            • memory/1064-37-0x0000000001F30000-0x0000000002233000-memory.dmp

              Filesize

              3.0MB

            • memory/1064-39-0x0000000001D30000-0x0000000001DC3000-memory.dmp

              Filesize

              588KB

            • memory/1064-43-0x00000000000F0000-0x000000000011A000-memory.dmp

              Filesize

              168KB

            • memory/1280-40-0x0000000000110000-0x0000000000210000-memory.dmp

              Filesize

              1024KB

            • memory/1280-33-0x0000000004260000-0x0000000004337000-memory.dmp

              Filesize

              860KB

            • memory/1280-31-0x0000000002DD0000-0x0000000002ED0000-memory.dmp

              Filesize

              1024KB

            • memory/1280-41-0x0000000004260000-0x0000000004337000-memory.dmp

              Filesize

              860KB

            • memory/2356-6-0x00000000746F0000-0x0000000074DDE000-memory.dmp

              Filesize

              6.9MB

            • memory/2356-0-0x0000000000880000-0x00000000008FE000-memory.dmp

              Filesize

              504KB

            • memory/2356-10-0x00000000746F0000-0x0000000074DDE000-memory.dmp

              Filesize

              6.9MB

            • memory/2356-7-0x0000000004C10000-0x0000000004C50000-memory.dmp

              Filesize

              256KB

            • memory/2356-3-0x0000000004C10000-0x0000000004C50000-memory.dmp

              Filesize

              256KB

            • memory/2356-2-0x00000000001F0000-0x000000000020C000-memory.dmp

              Filesize

              112KB

            • memory/2356-1-0x00000000746F0000-0x0000000074DDE000-memory.dmp

              Filesize

              6.9MB

            • memory/2444-12-0x0000000000380000-0x00000000003FE000-memory.dmp

              Filesize

              504KB

            • memory/2444-18-0x00000000048C0000-0x0000000004900000-memory.dmp

              Filesize

              256KB

            • memory/2444-27-0x00000000746F0000-0x0000000074DDE000-memory.dmp

              Filesize

              6.9MB

            • memory/2444-13-0x00000000746F0000-0x0000000074DDE000-memory.dmp

              Filesize

              6.9MB

            • memory/2444-14-0x00000000048C0000-0x0000000004900000-memory.dmp

              Filesize

              256KB

            • memory/2444-15-0x00000000746F0000-0x0000000074DDE000-memory.dmp

              Filesize

              6.9MB

            • memory/2444-16-0x00000000048C0000-0x0000000004900000-memory.dmp

              Filesize

              256KB

            • memory/2616-32-0x0000000000190000-0x00000000001A4000-memory.dmp

              Filesize

              80KB

            • memory/2616-19-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/2616-21-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/2616-23-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2616-25-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/2616-28-0x0000000000850000-0x0000000000B53000-memory.dmp

              Filesize

              3.0MB

            • memory/2616-30-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB