Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2024 06:28

General

  • Target

    489a932f0f830c254f5985659d39c62e_JaffaCakes118.exe

  • Size

    961KB

  • MD5

    489a932f0f830c254f5985659d39c62e

  • SHA1

    0f7e2d9f7968229472e440e574143147601921a1

  • SHA256

    f786969468695b70b06cc87c4628d1c64888068a88007326376bfa977c887fe5

  • SHA512

    454d77ad50dfd9fefbdce4acd270fb5c0f0b16b1269116bdcf08868b503dd89f8cbcbd7ab1234320e54d60aa6e3808317a031a738d78f7219b3b70aa74a1e3f7

  • SSDEEP

    12288:SK16ZLSbKnkXl5ZwH4kIF9RcvYk4+CWfJf2IOl7de:SKEZYckXLZwYk4cCIfx2B7d

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ntg

Decoy

successwithyolandafgreen.com

theordinaryph.com

atamyo-therapeutics.com

pophazard.com

anthonyfultz.com

pasanglham.com

kanekhushi.com

littlefishyswim.com

kaieteurny.com

fanavartima.com

digexpo.com

se-rto.com

chaos.finance

bakldx.com

after-school.pro

faithfromphilly.com

estudiomuradian.com

albertocerasini.com

andronna.com

wingspotusa.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\489a932f0f830c254f5985659d39c62e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\489a932f0f830c254f5985659d39c62e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:472
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mwjzVbUGarqP" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC1F3.tmp"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3064
    • C:\Users\Admin\AppData\Local\Temp\489a932f0f830c254f5985659d39c62e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\489a932f0f830c254f5985659d39c62e_JaffaCakes118.exe"
      2⤵
        PID:4432
      • C:\Users\Admin\AppData\Local\Temp\489a932f0f830c254f5985659d39c62e_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\489a932f0f830c254f5985659d39c62e_JaffaCakes118.exe"
        2⤵
          PID:2288
        • C:\Users\Admin\AppData\Local\Temp\489a932f0f830c254f5985659d39c62e_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\489a932f0f830c254f5985659d39c62e_JaffaCakes118.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3368

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmpC1F3.tmp

        Filesize

        1KB

        MD5

        b80b97e2ab8bd34a7d23b7bc8eb22fb4

        SHA1

        be8dee108ac1349a641d228c583ad64e041c420a

        SHA256

        2d49dad9383e69e0eb799860a1477cf4c2b99e2583b9a30c9a36b3c745282adb

        SHA512

        e3a1619c3d0b1f4780951d6a887efe02bf65245008aa31537f8b82cafc60e9ed4fc5746ca55f5389ac1865ae3f2b5b355d8f6b70964e524716aa8e6167e98ee1

      • memory/472-4-0x00000000050B0000-0x0000000005142000-memory.dmp

        Filesize

        584KB

      • memory/472-9-0x0000000074FDE000-0x0000000074FDF000-memory.dmp

        Filesize

        4KB

      • memory/472-3-0x0000000005660000-0x0000000005C04000-memory.dmp

        Filesize

        5.6MB

      • memory/472-0-0x0000000074FDE000-0x0000000074FDF000-memory.dmp

        Filesize

        4KB

      • memory/472-6-0x00000000051B0000-0x0000000005206000-memory.dmp

        Filesize

        344KB

      • memory/472-5-0x0000000004FE0000-0x0000000004FEA000-memory.dmp

        Filesize

        40KB

      • memory/472-2-0x0000000005010000-0x00000000050AC000-memory.dmp

        Filesize

        624KB

      • memory/472-8-0x00000000053C0000-0x00000000053CA000-memory.dmp

        Filesize

        40KB

      • memory/472-7-0x0000000074FD0000-0x0000000075780000-memory.dmp

        Filesize

        7.7MB

      • memory/472-10-0x0000000074FD0000-0x0000000075780000-memory.dmp

        Filesize

        7.7MB

      • memory/472-11-0x0000000000F50000-0x0000000000FB2000-memory.dmp

        Filesize

        392KB

      • memory/472-1-0x0000000000530000-0x0000000000626000-memory.dmp

        Filesize

        984KB

      • memory/472-19-0x0000000074FD0000-0x0000000075780000-memory.dmp

        Filesize

        7.7MB

      • memory/3368-17-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/3368-20-0x0000000001500000-0x000000000184A000-memory.dmp

        Filesize

        3.3MB