Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-05-2024 22:32

General

  • Target

    822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    822bfd7e6b9a02844e5b52fdc971bcdd

  • SHA1

    a66315e4bc32830158549601eb8c02d89e616bad

  • SHA256

    c90168203989a5d0e8a10cbb0753d83efad01793b94fd6480701059df2529d4f

  • SHA512

    8b3d33b04f09388e9e7ca8b4c5138249e109780e318f002ef87b8f36ab9d441a85bf6270b2885d33dfe93bde8f027512311871aedbea9e738544faf162e50b7f

  • SSDEEP

    192:W1UugtKtPRaEdxKYRrRbZxh+F1lZ48CAZ8Ll6t+6PzKrd0As+2Dnznz3s34rbxgp:WZhRMF1DHOUrK5z6XI4r1gIG

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ysl

Decoy

descansosnm.com

ciastaniespodzianka.store

jeeugae.com

cleanfunnies.com

gaywelove.com

setecandeeiroscaja.com

lacafe.rest

fuyujen.com

hit-community.com

docusharego.com

urquell-energie-code.com

pattycordeiro.com

40momentive.com

hydrogengascars.com

focusdekalb.com

sandiegorealestate.report

agence-comy.com

wgtseguros.com

bajajloangroup.com

securefedegestion.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Formbook payload 2 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Users\Admin\AppData\Local\Temp\822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\822bfd7e6b9a02844e5b52fdc971bcdd_JaffaCakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3168
      • C:\Windows\SysWOW64\timeout.exe
        timeout 4
        3⤵
        • Delays execution with timeout.exe
        PID:4748
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
        3⤵
          PID:560
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
          3⤵
            PID:4936
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
            3⤵
              PID:2108
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
              3⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:4224
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 1836
              3⤵
              • Program crash
              PID:1268
          • C:\Windows\SysWOW64\wlanext.exe
            "C:\Windows\SysWOW64\wlanext.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3388
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
              3⤵
                PID:3700
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3168 -ip 3168
            1⤵
              PID:4992

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/3168-14-0x00000000746D0000-0x0000000074E80000-memory.dmp

              Filesize

              7.7MB

            • memory/3168-2-0x0000000005400000-0x000000000549C000-memory.dmp

              Filesize

              624KB

            • memory/3168-1-0x0000000000A80000-0x0000000000A8A000-memory.dmp

              Filesize

              40KB

            • memory/3168-3-0x00000000746D0000-0x0000000074E80000-memory.dmp

              Filesize

              7.7MB

            • memory/3168-4-0x0000000005FA0000-0x0000000005FF4000-memory.dmp

              Filesize

              336KB

            • memory/3168-5-0x00000000746D0000-0x0000000074E80000-memory.dmp

              Filesize

              7.7MB

            • memory/3168-6-0x00000000065A0000-0x0000000006B44000-memory.dmp

              Filesize

              5.6MB

            • memory/3168-0-0x00000000746DE000-0x00000000746DF000-memory.dmp

              Filesize

              4KB

            • memory/3388-17-0x0000000000940000-0x0000000000957000-memory.dmp

              Filesize

              92KB

            • memory/3388-15-0x0000000000940000-0x0000000000957000-memory.dmp

              Filesize

              92KB

            • memory/3436-26-0x000000000B140000-0x000000000B275000-memory.dmp

              Filesize

              1.2MB

            • memory/3436-13-0x000000000AFE0000-0x000000000B138000-memory.dmp

              Filesize

              1.3MB

            • memory/3436-19-0x000000000AFE0000-0x000000000B138000-memory.dmp

              Filesize

              1.3MB

            • memory/3436-22-0x000000000B140000-0x000000000B275000-memory.dmp

              Filesize

              1.2MB

            • memory/3436-23-0x000000000B140000-0x000000000B275000-memory.dmp

              Filesize

              1.2MB

            • memory/4224-11-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4224-8-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4224-9-0x0000000001440000-0x000000000178A000-memory.dmp

              Filesize

              3.3MB

            • memory/4224-12-0x0000000000FA0000-0x0000000000FB4000-memory.dmp

              Filesize

              80KB