Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 11:31

General

  • Target

    671c2e2710c301a026919308026c7865_JaffaCakes118.exe

  • Size

    396KB

  • MD5

    671c2e2710c301a026919308026c7865

  • SHA1

    2b36ae436a477b786d336ecdb36965d0c745843e

  • SHA256

    d451f6bc38ae71eccde50310507a91527714d64bec4aa4cdba613983a75145e1

  • SHA512

    3296dcc9aca95c774eeb4767d7e6665b09ce954f0745cd6d0e020fb3e2eb72f0659488ed9824dd489f7a83326cdf897b9d7ff9f331a9e8b9c8fe8a8d209e7595

  • SSDEEP

    12288:SESMBSEogkFvySfgX5LTzoa61+fn+8ix8SQfBItW:SESMZgvPWUU0x836tW

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

a8c

Decoy

kesslergroupinternational.net

elcarretazo.com

livbim.info

thamxop.net

abitur.expert

cidavidjoy.com

digitalkarwaan.com

hcave.com

foundbyjack.com

servicarpasjc.com

giaotrinh24h.com

ladasno.com

harrisxn.com

bestbtccasinos.info

australianflying.com

louboutinshoes.site

taohaomi.net

s5league-europe.com

lizhongysw.com

imizuspotsboxboxinggym.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\671c2e2710c301a026919308026c7865_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\671c2e2710c301a026919308026c7865_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\boondocks.exe
        C:\Users\Admin\AppData\Local\Temp\boondocks.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:304
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\cmd.exe"
        3⤵
          PID:1628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Kinematograph.DLL
      Filesize

      68KB

      MD5

      691ec4e437e2d8d03f7994757ecb37fd

      SHA1

      1d0569a79e78e17d16a2a1521c1cae9660d5aa4b

      SHA256

      14254882a6ca827e5107a6b0c91e7e58c50a42578e901b9aa0c3bcfd167618f6

      SHA512

      07850678b8157178987352ccbe4ba5caea7c46fb0927cf7f5a500c67916357861f1d85cfd2d9d83523d783d3d85684daf872eb0119b6081532ef9c5d2c95ea64

    • C:\Users\Admin\AppData\Local\Temp\Kudzu
      Filesize

      237KB

      MD5

      337d6e2237e91da268a1d566a485fb3f

      SHA1

      72b0fd5e68540d0c4eb1d42c6bf6d3c428bfad73

      SHA256

      9e291aa0ac27bba51166095be1f04e21c2f117e764839e6b899bb636ca323cb7

      SHA512

      39ea4520984ad9801ea02850c016403c3955af757b70b35561dedb0a51dcb0f90988329dbffbce84b02003e97e86bde43ae78df180695827017bdd17017c2f6d

    • \Users\Admin\AppData\Local\Temp\boondocks.exe
      Filesize

      48KB

      MD5

      f2c010efa41b7f7964f3f7c33d274d2c

      SHA1

      0fa34299cf3cae1f97ce61616481b268fc2d61a4

      SHA256

      1c79fad4da54e50dc05a2ef8b04e650e02dd9e42188aadfd834e64e85c693af0

      SHA512

      722a515ebbba7d381b3630f4696352377274a02e804e465900eaad32099c57ce89fb9703444372ac5c97f75ca387e906cd51000ed3aa1fa85606024e41eac3ae

    • memory/304-71-0x00000000023D0000-0x00000000023E4000-memory.dmp
      Filesize

      80KB

    • memory/304-64-0x0000000002250000-0x0000000002264000-memory.dmp
      Filesize

      80KB

    • memory/304-70-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/304-58-0x0000000000090000-0x0000000000096000-memory.dmp
      Filesize

      24KB

    • memory/304-61-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/304-65-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/304-63-0x0000000003380000-0x0000000003683000-memory.dmp
      Filesize

      3.0MB

    • memory/1212-67-0x0000000005070000-0x0000000005199000-memory.dmp
      Filesize

      1.2MB

    • memory/1212-66-0x00000000031D0000-0x00000000032D0000-memory.dmp
      Filesize

      1024KB

    • memory/1212-72-0x0000000004A90000-0x0000000004B8A000-memory.dmp
      Filesize

      1000KB

    • memory/1212-78-0x0000000005070000-0x0000000005199000-memory.dmp
      Filesize

      1.2MB

    • memory/1212-80-0x0000000004A90000-0x0000000004B8A000-memory.dmp
      Filesize

      1000KB

    • memory/2712-51-0x0000000000250000-0x000000000025C000-memory.dmp
      Filesize

      48KB

    • memory/2712-57-0x0000000075BD0000-0x0000000075C05000-memory.dmp
      Filesize

      212KB

    • memory/2712-50-0x0000000000030000-0x0000000000032000-memory.dmp
      Filesize

      8KB

    • memory/2960-73-0x0000000000B70000-0x0000000000B88000-memory.dmp
      Filesize

      96KB

    • memory/2960-75-0x0000000000B70000-0x0000000000B88000-memory.dmp
      Filesize

      96KB