Analysis

  • max time kernel
    73s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 00:00

General

  • Target

    b58faebe1453acc289bfd688688e2474_JaffaCakes118.exe

  • Size

    612KB

  • MD5

    b58faebe1453acc289bfd688688e2474

  • SHA1

    730b350d9365074bcce398290a8c620c68209290

  • SHA256

    1ec5aeccf89c5d7a378e443e742e37f05a2aa7cb71150ee0ca4876c6b37d7b4d

  • SHA512

    bc6c24e85f9cdad6405ed187c689e21461916e85b12822027d1dcc87eeb1403154ba984cfcbc69fe812529f530561cbb9e3376fab7795ce1fc32e8883daa2ff5

  • SSDEEP

    12288:Gmc51xGbhjB4pDHfx1TmIgzLivEv+Sbv6Xyq+mOnGrthsZJCVG:GhvGr4pzff3gN1O6mOM6G

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bft

Decoy

edenicities.com

buntingfordhomeservices.com

nuanceproducoes.com

divasinspire.com

capiturn.com

zbjsn.com

thegioicaytrongnha.com

featherventure.com

onbrandtrading.com

sanguoban.com

doorman.pro

ourhomie.net

iwassickonholiday.com

mrcskin.com

reallycoolmask.com

tkrbeautyinstitut.com

keytomiami.com

sesliduybeni.com

asherwebber.com

starkweatherwindows.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b58faebe1453acc289bfd688688e2474_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b58faebe1453acc289bfd688688e2474_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FpWaZyoK" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC21.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1580
    • C:\Users\Admin\AppData\Local\Temp\b58faebe1453acc289bfd688688e2474_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\b58faebe1453acc289bfd688688e2474_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpC21.tmp

    Filesize

    1KB

    MD5

    52ed19102738d9b24dc75b29758ae312

    SHA1

    dbb31980951c15db6c215e6600d0eb2e730c00e0

    SHA256

    ccd42d322095354080e73a4f1fca9295269b8364d33ce8663c4f2b131c50436a

    SHA512

    c8fafd86b2363df422c74b23c855e959e421fc592751bec0668f70b57ed9ef01fe645d2b7d9edbd974293bb3dec670f56e42c32eb08ef8291b97350c53a330fd

  • memory/1720-0-0x0000000074521000-0x0000000074522000-memory.dmp

    Filesize

    4KB

  • memory/1720-1-0x0000000074520000-0x0000000074ACB000-memory.dmp

    Filesize

    5.7MB

  • memory/1720-2-0x0000000074520000-0x0000000074ACB000-memory.dmp

    Filesize

    5.7MB

  • memory/1720-3-0x0000000074520000-0x0000000074ACB000-memory.dmp

    Filesize

    5.7MB

  • memory/1720-4-0x0000000074520000-0x0000000074ACB000-memory.dmp

    Filesize

    5.7MB

  • memory/1720-17-0x0000000074520000-0x0000000074ACB000-memory.dmp

    Filesize

    5.7MB

  • memory/2668-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2668-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2668-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2668-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2668-18-0x0000000000C80000-0x0000000000F83000-memory.dmp

    Filesize

    3.0MB