Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 15:22

General

  • Target

    2a9a30eec97ab00aa5383eb5b7b39e4c_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    2a9a30eec97ab00aa5383eb5b7b39e4c

  • SHA1

    4e557ee5f1c71f649ec7c700d4d8582bce462db3

  • SHA256

    61c879a82dd2352181a729b07d05a8d4c871a120a1ca69a673892b7ecb5b95c1

  • SHA512

    fdc1dc6795d746be2a695498d718b88f3debebe636f4fbef7b7858dfb64ed3a9f1aebf29287a1d880aa0ac1f05f410ebc9097de8a5501020e3e309677dc1387b

  • SSDEEP

    12288:Dvm7Ib5morl71BT1c2rtHCaDKUdaKAM9J1VyAtR9jphJYIcjdLtophIm9wIdAksQ:Uri1fHhH2MM+9VXfpC0w2AM2m

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

l7

Decoy

water360.net

mantle-liquid.com

crypto1st.com

zhangying7.com

macsupportusa.online

hellocellular.online

linkhay.info

equipoprofesional.online

happyholi2017.com

halobuilders.net

gaelleautin.com

kateklamer.com

keyarmor.com

sandamall.com

livifyfe.com

pkmuxb.ink

precios10.com

baitongjxgs.com

pinnacle175.com

dlpansr.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a9a30eec97ab00aa5383eb5b7b39e4c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a9a30eec97ab00aa5383eb5b7b39e4c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\2a9a30eec97ab00aa5383eb5b7b39e4c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2a9a30eec97ab00aa5383eb5b7b39e4c_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4748
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4040 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3304

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3076-9-0x0000000000400000-0x0000000000565000-memory.dmp

      Filesize

      1.4MB

    • memory/3076-18-0x0000000002680000-0x0000000002681000-memory.dmp

      Filesize

      4KB

    • memory/3076-8-0x00000000022D0000-0x00000000022D1000-memory.dmp

      Filesize

      4KB

    • memory/3076-7-0x0000000002360000-0x0000000002361000-memory.dmp

      Filesize

      4KB

    • memory/3076-6-0x0000000002370000-0x0000000002371000-memory.dmp

      Filesize

      4KB

    • memory/3076-5-0x0000000002380000-0x0000000002381000-memory.dmp

      Filesize

      4KB

    • memory/3076-4-0x00000000022B0000-0x00000000022B1000-memory.dmp

      Filesize

      4KB

    • memory/3076-0-0x0000000000400000-0x0000000000565000-memory.dmp

      Filesize

      1.4MB

    • memory/3076-22-0x0000000000400000-0x0000000000565000-memory.dmp

      Filesize

      1.4MB

    • memory/3076-1-0x0000000002300000-0x0000000002342000-memory.dmp

      Filesize

      264KB

    • memory/3076-3-0x00000000022C0000-0x00000000022C1000-memory.dmp

      Filesize

      4KB

    • memory/3076-11-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/3076-12-0x0000000002410000-0x0000000002411000-memory.dmp

      Filesize

      4KB

    • memory/3076-13-0x0000000002680000-0x0000000002681000-memory.dmp

      Filesize

      4KB

    • memory/3076-14-0x0000000000400000-0x0000000000565000-memory.dmp

      Filesize

      1.4MB

    • memory/3076-15-0x0000000000400000-0x0000000000565000-memory.dmp

      Filesize

      1.4MB

    • memory/3076-16-0x0000000002300000-0x0000000002342000-memory.dmp

      Filesize

      264KB

    • memory/3076-10-0x0000000002350000-0x0000000002351000-memory.dmp

      Filesize

      4KB

    • memory/3076-2-0x00000000023B0000-0x00000000023B1000-memory.dmp

      Filesize

      4KB

    • memory/4748-20-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB