General

  • Target

    50803379c862897b497e96fb6f5b3f48JaffaCakes118.bin

  • Size

    709KB

  • Sample

    240517-3d1kvsge7t

  • MD5

    50803379c862897b497e96fb6f5b3f48

  • SHA1

    0ca45c28c48d06a9349ac1edd3f2d0430d254768

  • SHA256

    b2ed4938e2e41c6015a953684f2e3a271044a0f7ede57e202e0026d492bf7c5a

  • SHA512

    420561ca82648f81ffd92175454b72d756eadd88c42c2809868da7e17af479e049b9b3283e91017dda0297a83c6c706f5dc29825b75c7ac71aa5797bc32f4f9c

  • SSDEEP

    12288:w1kx0ygplQ/7F3pAklbX5cPLxGOOv3KkDNx0yna:w6x0ygpu/7RpAkp+z7Ov3dhx0ya

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

ch48

Decoy

rengsrang.com

diamondresult.com

regalcoinvietnam.com

sowmobile.com

davidbahrein.com

christianplaysguitar.com

hotelruraldalameira.com

sydhr.com

efthen.com

stayinabq.com

beautyscout24.com

saucemount.com

xnewmovie.info

wickedwebcamsites.com

xalsnz.info

04db.com

shahrood-daneshgostar.com

golfsierraphoto.com

dodacaocap.net

riptidefishing.com

Targets

    • Target

      50803379c862897b497e96fb6f5b3f48JaffaCakes118.bin

    • Size

      709KB

    • MD5

      50803379c862897b497e96fb6f5b3f48

    • SHA1

      0ca45c28c48d06a9349ac1edd3f2d0430d254768

    • SHA256

      b2ed4938e2e41c6015a953684f2e3a271044a0f7ede57e202e0026d492bf7c5a

    • SHA512

      420561ca82648f81ffd92175454b72d756eadd88c42c2809868da7e17af479e049b9b3283e91017dda0297a83c6c706f5dc29825b75c7ac71aa5797bc32f4f9c

    • SSDEEP

      12288:w1kx0ygplQ/7F3pAklbX5cPLxGOOv3KkDNx0yna:w6x0ygpu/7RpAkp+z7Ov3dhx0ya

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Formbook payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks