Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-06-2024 14:09

General

  • Target

    9aed70a63a9b5ba11bd1f44177f1a1ad_JaffaCakes118.exe

  • Size

    284KB

  • MD5

    9aed70a63a9b5ba11bd1f44177f1a1ad

  • SHA1

    3dcd99b61503cc69cdcddeb783f746da5f167edb

  • SHA256

    fa580f04db69517d1b9f7f9e1d88367e89645f90d8eb0698c4793389d3aabda8

  • SHA512

    2d9edf0d7f5ccdebf27690a5269a87334cbe8d64a676e9b3ee23c191cf3449387446c7968cbfa53a8bc16d3becc5395a1b370a6e633c35e2dbdddc03909f110c

  • SSDEEP

    3072:VuH0Vy0up0NMjbcORKCwNETwoWqcFysVKHxnIZJpS9eqsqcD4JoMf:EHmy0dNMjQDCwNETw359axnIZb6sMJh

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

css

Decoy

fnxmedia.com

joakimnoahonline.com

prorokers.net

otfego.info

lucao20201.com

1q4y6.info

carefullyhandmade.com

walktalkbaby.com

carpetcanvas.win

boyzpro.com

the-one-wave.com

cbd-oil.online

uiiuii.net

securitycameraadvisor.com

phillipsfarmstead.com

vssuq.info

huasitee.com

bitandbreakfast.com

poiuyt.info

haterstyle.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9aed70a63a9b5ba11bd1f44177f1a1ad_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9aed70a63a9b5ba11bd1f44177f1a1ad_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:540
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 776
      2⤵
      • Program crash
      PID:2556
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 792
      2⤵
      • Program crash
      PID:1624
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 540 -ip 540
    1⤵
      PID:60
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 540 -ip 540
      1⤵
        PID:4344

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/540-3-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/540-4-0x0000000077E51000-0x0000000077F71000-memory.dmp

        Filesize

        1.1MB

      • memory/540-5-0x000000000B950000-0x000000000BC9A000-memory.dmp

        Filesize

        3.3MB