Analysis

  • max time kernel
    146s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 14:10

General

  • Target

    bc0d9c5250c435e2b08aad396db5fbea_JaffaCakes118.exe

  • Size

    381KB

  • MD5

    bc0d9c5250c435e2b08aad396db5fbea

  • SHA1

    8ef94d5400b6d10fa683ca6bad7efd19ef2282c3

  • SHA256

    267cdbd24ba0c232c80967c7c39f454db0e59b6943836750a5cfbaf2540768d8

  • SHA512

    70f75fa30063fdd3b0452e4d0b2936d27de2bfa3c7c5430bb96e532229211ffab167dcf32cfb552463c075b12f01427132c207f530026df710cd4e72174c6269

  • SSDEEP

    6144:bDsrpmOp5fjFopppppppp4a5pppppppppppppppppppppppppppppppppppppppQ:bDsdRBGpppppppp/ppppppppppppppp

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

mi

Decoy

deliris.net

tqcsi-yaran.com

sgrejg.info

vertical-boiler.com

10-56milanstreetmentone.com

electricoslaheroica.com

bombergersarchive.com

177vno.info

hydbad.com

amazonsignage.com

marcelkulhanek.com

purebeautyorganic.com

icerinkcoffee.com

hengshuiyafeng.com

improvereligion.com

hydroponics-aeroponics.com

botmatridee.com

summerfieldalignment.com

xeroaccountantmelbourne.net

babelgrim.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Drops startup file 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\bc0d9c5250c435e2b08aad396db5fbea_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\bc0d9c5250c435e2b08aad396db5fbea_JaffaCakes118.exe"
        2⤵
        • Drops startup file
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\saaniqtl\saaniqtl.cmdline"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2152
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCD3E.tmp" "c:\Users\Admin\AppData\Local\Temp\saaniqtl\CSC470E0CE44A2A42D7BED72597D6136D0.TMP"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2236
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Windows\SysWOW64\wininit.exe
            "C:\Windows\SysWOW64\wininit.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2696
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESCD3E.tmp

      Filesize

      1KB

      MD5

      41c1f36699c2e554ae0bf1a2c714604f

      SHA1

      02006a6ff1e543bdb10964480ddcae61dcb9009a

      SHA256

      fbb5b1735cbaff4e9acef30c92120b6c1e13ec46c2614e79fdacb141266db323

      SHA512

      7aca518f058595df9228736c9194f8416202f3fc39f85c1f4f61fd106877fd90e21343b5a9b1cbc0ce755c12c331a5412c76c221d72fcb1b5a500b40d9464f0d

    • C:\Users\Admin\AppData\Local\Temp\saaniqtl\saaniqtl.dll

      Filesize

      14KB

      MD5

      03cb0d66287a088e2fa40f5a16f942a2

      SHA1

      05cce860fe462ba7de11e7711dcf1c17ba739822

      SHA256

      1a2328c5bf029b7d0f8bce2666857376bebab6cd5c2c319ae931f104bdf2e9ae

      SHA512

      ebd9efdbca17ba27b6df45af70a37d9aaf35687b054a2d4c05e65790dceacff8a71941c2d637a9764e6c55438073942fb7d1daeb0cd94bae154bb5df1a9f34d4

    • C:\Users\Admin\AppData\Local\Temp\saaniqtl\saaniqtl.pdb

      Filesize

      49KB

      MD5

      4f267da38400de3a516cae411c0c004e

      SHA1

      c1dd17925682c95ed3bf588b9e37cbf7adcf2d19

      SHA256

      b6be2f80058776ceb61490ed72a1b198dc7315a747a22e3aad915d5c84811bf9

      SHA512

      75a344f8410d41684582bdc7b453d8e1242437043926bff934a8828dad40ac8de21a2d5967b84f973f8c3657ee07669d79cee65bbe4899479fec2eb3adf69f4b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.url

      Filesize

      99B

      MD5

      563cde531ce3171d7420f2dd470f2ce2

      SHA1

      19c106e46ff80d05ccb52cba7924b26d0adfda51

      SHA256

      0e1597ce314bf9edbcdc4de33b10bdfad7ead132d6854e7d9c49a27593ac2eca

      SHA512

      c94b29166399a32a3b1386642099b40b9a8f51df3c39567d3978c599457591de6055bfcc238b682c2779cfe56bda1aa7b43b2a749681270b40f23e658ce527dc

    • \??\c:\Users\Admin\AppData\Local\Temp\saaniqtl\CSC470E0CE44A2A42D7BED72597D6136D0.TMP

      Filesize

      1KB

      MD5

      af8bf5f79aaf531fee477ab7a8ebc459

      SHA1

      9a8ed9fb358e4dd4ed324bae3887fe0447ca5f67

      SHA256

      8aa2bb63ee502062f0f18f2b63d3a6605dc478cc3ec1dda3b8e1639c15472c9f

      SHA512

      2f76f012f897a4be442ce062f079a41fe880276cfc52466c2bdbd2e79140ce71657fa1c126b6c3d023d1ad01f39e19029976e2583d57c39de79b1e4ef7debfbc

    • \??\c:\Users\Admin\AppData\Local\Temp\saaniqtl\saaniqtl.0.cs

      Filesize

      26KB

      MD5

      034b7ff6021dabbe765304758ae537dc

      SHA1

      42c9be44efa31bd97e496df6b3dd051f7f735e5e

      SHA256

      ed8359eec525cd11d29b30119d345617a26e10eb6034f048d8bf7f71863a5b78

      SHA512

      1e792efa914b27a1102f658ef0394963c61a00b068e9024b8543eb9d68363124bf063e71cc0365977e43fb360e8b9d252ce560bb8c62f7185d1340da01b33693

    • \??\c:\Users\Admin\AppData\Local\Temp\saaniqtl\saaniqtl.cmdline

      Filesize

      248B

      MD5

      ba1b829d6a747d8507f81bcc903ed667

      SHA1

      7a8ae59db7486fce03c9a2be90d0b2efb08ef57c

      SHA256

      2f5df7cd64b72a1f4c1d0430a94aee4ce18d9d2d9564d062ae5b6ff0470e0f95

      SHA512

      b6ef215448965b79d58c5d3feac910e6f64185f6131b16e2b9c25700d2bb27ea9443d5f2d39739395772e57159b1e8c05646c23ef36e7f1c044e8d284e27b0c9

    • memory/1196-32-0x00000000074D0000-0x0000000007645000-memory.dmp

      Filesize

      1.5MB

    • memory/1196-36-0x00000000074D0000-0x0000000007645000-memory.dmp

      Filesize

      1.5MB

    • memory/1196-43-0x0000000004B80000-0x0000000004C4F000-memory.dmp

      Filesize

      828KB

    • memory/1196-37-0x0000000004B80000-0x0000000004C4F000-memory.dmp

      Filesize

      828KB

    • memory/2696-42-0x0000000000F40000-0x0000000000F5A000-memory.dmp

      Filesize

      104KB

    • memory/2696-40-0x0000000000F40000-0x0000000000F5A000-memory.dmp

      Filesize

      104KB

    • memory/2756-35-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2756-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2756-25-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2756-31-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2756-24-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2932-29-0x0000000074CE0000-0x00000000753CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2932-0-0x0000000074CEE000-0x0000000074CEF000-memory.dmp

      Filesize

      4KB

    • memory/2932-1-0x00000000008A0000-0x0000000000906000-memory.dmp

      Filesize

      408KB

    • memory/2932-5-0x0000000074CE0000-0x00000000753CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2932-23-0x0000000004A10000-0x0000000004A3A000-memory.dmp

      Filesize

      168KB

    • memory/2932-20-0x0000000000A30000-0x0000000000A3C000-memory.dmp

      Filesize

      48KB

    • memory/2932-19-0x00000000049D0000-0x0000000004A0A000-memory.dmp

      Filesize

      232KB

    • memory/2932-17-0x0000000000850000-0x000000000085A000-memory.dmp

      Filesize

      40KB