General

  • Target

    fa4b5c73d0c9e8d63ea0e3a542e9f597_JaffaCakes118

  • Size

    483KB

  • Sample

    240419-pmzg9sdb9t

  • MD5

    fa4b5c73d0c9e8d63ea0e3a542e9f597

  • SHA1

    299a662a55d48615cca37d2d15487750b64924be

  • SHA256

    b665a2f0bbbac92a396e86cbd866cb0cdc873dcb830958a86ace61e510f6bc3a

  • SHA512

    7e2fdaa02660135c7cb8bcc1d97faf92a5a4626653b4452a9be14a49af3250ec2d2d52e1233b12e2745fa40e5055d377f23fae6b12dc38f09318edf6845cf36c

  • SSDEEP

    6144:MIFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9f:xh8Mz+sv3y2N1xzAZprkmuN/SD5iKefd

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ow

Decoy

piavecaffe.com

jlxkqg.men

lifesavingfoundation.net

karadasama.net

michaeltraolach-macsweeney.com

thunderwatches.com

serviciocasawhirlpool.biz

c-cap.online

itparksolution.com

clarityhearingkw.com

wpgrosiri.date

colemarshalcambell.com

webperffest.com

adjusterforirma.info

buildersqq.com

spiritualwisdominindia.com

111222333.net

traditionalarabicdishes.com

hmlifi.com

receive-our-info-heredaily.info

Targets

    • Target

      fa4b5c73d0c9e8d63ea0e3a542e9f597_JaffaCakes118

    • Size

      483KB

    • MD5

      fa4b5c73d0c9e8d63ea0e3a542e9f597

    • SHA1

      299a662a55d48615cca37d2d15487750b64924be

    • SHA256

      b665a2f0bbbac92a396e86cbd866cb0cdc873dcb830958a86ace61e510f6bc3a

    • SHA512

      7e2fdaa02660135c7cb8bcc1d97faf92a5a4626653b4452a9be14a49af3250ec2d2d52e1233b12e2745fa40e5055d377f23fae6b12dc38f09318edf6845cf36c

    • SSDEEP

      6144:MIFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9f:xh8Mz+sv3y2N1xzAZprkmuN/SD5iKefd

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks