Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 12:21

General

  • Target

    108156ae3609706003c6cefd6335c554_JaffaCakes118.exe

  • Size

    368KB

  • MD5

    108156ae3609706003c6cefd6335c554

  • SHA1

    9ad9e65ee4407162beb14eb33859ffc77451e7fb

  • SHA256

    535d92c4a194c64723fdf9b7279f033085c0861d93b9f43747320759fd172afc

  • SHA512

    72ec03a163d291c9fc8e73689e63e0b55aa78d2c97e83b2187d581592d09a7ab361004ce72ee9a8792dee6c36a4a6ffda80391106afc2a1e7733653f813b247f

  • SSDEEP

    3072:aFFyrH+tfkhzjvRYkYjvnNfugsIN23+q7cuZv2kjgyoWOuClDfujpITpVxzApTld:aiHGIRYtvZughqLFeuwi0pVaY

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

jc

Decoy

petfashionvalley.com

sisermexico.com

mycityneighbors.com

trojanerhilfe.com

2012mi.com

bitcoinkeith.com

integracube.com

portalgnu.com

xingcaiyule2.com

saasgroceries.com

groupulljimzasac.com

sscfz.win

microauditoria.com

grandijen.com

beautiebootik.com

trb899.com

autobittrex.com

greeksinbritain.com

flamingouno.com

agencecuivre.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\108156ae3609706003c6cefd6335c554_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\108156ae3609706003c6cefd6335c554_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\108156ae3609706003c6cefd6335c554_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\108156ae3609706003c6cefd6335c554_JaffaCakes118.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2180

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\win.ini

    Filesize

    509B

    MD5

    d2a2412bddba16d60ec63bd9550d933f

    SHA1

    deb3d3bdc9055f0b4909b31d3048446848fae0e1

    SHA256

    79ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a

    SHA512

    8fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31

  • memory/2084-3-0x00000000003D0000-0x00000000003D8000-memory.dmp

    Filesize

    32KB

  • memory/2084-4-0x00000000776C1000-0x00000000777C2000-memory.dmp

    Filesize

    1.0MB

  • memory/2084-5-0x00000000776C0000-0x0000000077869000-memory.dmp

    Filesize

    1.7MB

  • memory/2084-10-0x00000000003D0000-0x00000000003D8000-memory.dmp

    Filesize

    32KB

  • memory/2180-11-0x00000000776C0000-0x0000000077869000-memory.dmp

    Filesize

    1.7MB

  • memory/2180-13-0x00000000004E0000-0x00000000004E8000-memory.dmp

    Filesize

    32KB

  • memory/2180-12-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB