Analysis

  • max time kernel
    130s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 00:23

General

  • Target

    43c1fa37a457ffd874f0a9436454ebe0_JaffaCakes118.exe

  • Size

    822KB

  • MD5

    43c1fa37a457ffd874f0a9436454ebe0

  • SHA1

    ad1fd83082b611467ddc7ecccb00c5166514f3e0

  • SHA256

    128d2cc43031cf39f048f0121ec0e822b0428afbab703b0a9457cca9fc8325d3

  • SHA512

    6be7fe107fe6130f88853ce5e95779f53c8d5741958e7b24dae3768d3c2132ef3be4c943b7a4fcbd8b45fee00b1f71920e047687b33802646d556b11d373e195

  • SSDEEP

    6144:/vpIKl0eyoPbDIC/rMlXSWOUN0LwGodiCj1DSdj/4KngWIq6jRkoQ6o://QqnIMrO70LBeSKKngWIjLBo

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

dg1

Decoy

fcbarcelona.cloud

diadelosdoggos.com

zgyxmt.com

puntlanddna.online

ob58zzk99.biz

alvamd.com

fjgcf.info

liquormelbourne.com

essentialkratom.com

konbiniotakara.com

stressnomorebyalyssa.com

adoptiondossiers.com

3dprinted.gold

grandmasystems.com

17klxx.com

fstoptom.com

redd2801.com

wxibh1vx.biz

ahqiheng.com

607manbet.com

Signatures

  • Detect ZGRat V1 1 IoCs
  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43c1fa37a457ffd874f0a9436454ebe0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\43c1fa37a457ffd874f0a9436454ebe0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\Temp\43c1fa37a457ffd874f0a9436454ebe0_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\43c1fa37a457ffd874f0a9436454ebe0_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2556-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2556-13-0x0000000001C40000-0x0000000001F8A000-memory.dmp

    Filesize

    3.3MB

  • memory/2556-12-0x0000000001C40000-0x0000000001F8A000-memory.dmp

    Filesize

    3.3MB

  • memory/4912-3-0x0000000005060000-0x00000000050F2000-memory.dmp

    Filesize

    584KB

  • memory/4912-4-0x0000000074BA0000-0x0000000075350000-memory.dmp

    Filesize

    7.7MB

  • memory/4912-5-0x0000000005000000-0x0000000005020000-memory.dmp

    Filesize

    128KB

  • memory/4912-6-0x0000000005620000-0x00000000056BC000-memory.dmp

    Filesize

    624KB

  • memory/4912-7-0x0000000074BAE000-0x0000000074BAF000-memory.dmp

    Filesize

    4KB

  • memory/4912-8-0x0000000074BA0000-0x0000000075350000-memory.dmp

    Filesize

    7.7MB

  • memory/4912-0-0x0000000074BAE000-0x0000000074BAF000-memory.dmp

    Filesize

    4KB

  • memory/4912-11-0x0000000074BA0000-0x0000000075350000-memory.dmp

    Filesize

    7.7MB

  • memory/4912-2-0x0000000005710000-0x0000000005CB4000-memory.dmp

    Filesize

    5.6MB

  • memory/4912-1-0x00000000005F0000-0x00000000006C4000-memory.dmp

    Filesize

    848KB