Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2024 14:07

General

  • Target

    5f7a7b867374de7ce4277fd5c766312e_JaffaCakes118.exe

  • Size

    322KB

  • MD5

    5f7a7b867374de7ce4277fd5c766312e

  • SHA1

    763ea3f600136fd957bd7c42f148d42a6eb39621

  • SHA256

    dc9f16d932383754d9fbe28b7fbf59f3e5af1754582847981d264aa3225e1e17

  • SHA512

    7013ef483920b04972c69278b90146d6102e297a28e0db751d136c652da82b3a0720983432d253aeeb2540b748b423ac0acf71add0cfc83a89025bbdbfad14d6

  • SSDEEP

    6144:I8cXFf4JCjVyW64Y+oz993q8WxHz8VfcBN8Sq8Ul4X1NNHMsM7cuE8J:I8kiRox/nUQNssM7c3

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

sa

Decoy

brunoshooters.net

ceritangesex.win

ralphnation.com

taylortalks.com

immense.money

qianworld.net

smartphone.courses

khflorida.com

savingsaccountfree.technology

vcxnyi.info

spiceupyourspanish.com

ahwatukeeelectriciannow.com

sellinghomeswithlindsey.com

mychurch.site

baodingjinrongxiehui.com

xfun.ltd

fcmol.com

rudolfbike.com

nahuojie.net

protect-account-now.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f7a7b867374de7ce4277fd5c766312e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5f7a7b867374de7ce4277fd5c766312e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wuttzl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF0B5.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2452
    • C:\Users\Admin\AppData\Local\Temp\5f7a7b867374de7ce4277fd5c766312e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5f7a7b867374de7ce4277fd5c766312e_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpF0B5.tmp

    Filesize

    1KB

    MD5

    d81117793aafc49c2169549b23242110

    SHA1

    afa4b850f6f2bb4e823a14d6fe9c258cdb44223b

    SHA256

    07b6756b1188562ffbdcf4d20b8e9c2bc06d056e52b36168546414d7320f2ec9

    SHA512

    82e3e70efb8e23548f76c770ca8bba67213d9b9234974c2e5d4b408f321cedf79321a4dbe23525e69b693ae660d25e2f4b45d95aee6bc028c4c5405585841e95

  • memory/2196-0-0x00000000749C1000-0x00000000749C2000-memory.dmp

    Filesize

    4KB

  • memory/2196-1-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/2196-2-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/2196-3-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/2196-4-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/2196-17-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/2912-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2912-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2912-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2912-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2912-18-0x0000000000840000-0x0000000000B43000-memory.dmp

    Filesize

    3.0MB