Analysis

  • max time kernel
    137s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2024 06:24

General

  • Target

    b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe

  • Size

    340KB

  • MD5

    b6a71f32c73d5392dc3dcf5ebfd9f11a

  • SHA1

    82af158a9984597cfb71570ff87f52421e1b0d2c

  • SHA256

    6695ad2b11cf12fe057273b08f07f9020916cb68a2803206ecc31f61b9f6b7f1

  • SHA512

    aa6b1bc9ff70689c0740683c0858a48b348c4d9f018c3ca11745dcb74480efb89b89dc002159576cd0c461ff9b2de320729a3a40f984a83a8698a4e99d4f959b

  • SSDEEP

    6144:D3yaVwC1pYMTJCTmjd3M3YqUoqNgtDK5BGN1BOpF1d8EWkFRTlV1erRSaYv0P3:bVwMmgJEmjd4/UoqNggDGNaFGEWO1edH

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

c239

Decoy

shareourjesus.com

lavictoriaesdetodos.com

helpfulproductions.com

waggonerplastics.com

skipouya.com

everyoneshoroscope.com

winterstokeview.com

gutsyhomemakers.com

redstatesdigital.com

themacmeliusshow.com

beautybarnantucket.com

wearetwo-a.com

thenutritionessentialist.com

tapsiwadhwa.com

jundicompany.net

gobocawest.com

woodking.space

elegantap.com

2ndoss.info

ebay1111.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\b6a71f32c73d5392dc3dcf5ebfd9f11a_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:5012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2700-2-0x00000000001C0000-0x00000000001EF000-memory.dmp

    Filesize

    188KB

  • memory/2700-1-0x0000000000B20000-0x0000000000C20000-memory.dmp

    Filesize

    1024KB

  • memory/5012-3-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB