Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 11:53

General

  • Target

    be89164ecb2619c73b8aa49503c87ab3_JaffaCakes118.exe

  • Size

    405KB

  • MD5

    be89164ecb2619c73b8aa49503c87ab3

  • SHA1

    4527ba51a42f2e99a30fa14c0cbac17adb1a4c61

  • SHA256

    fe76d90027602729ed2e7d13c8db252f609f0c99b3c3bc263ac43df01ac93dbe

  • SHA512

    08e8f30f09d79978c49fbae930b305829f63b59655bccb07cc8fc2c7de7c32df2d013d82d1cd931670a0bd8984d08df36ac41186ad59f4a2a3521d6750d92f34

  • SSDEEP

    6144:nInzaVaiwTFpxzm23Kr389xVWoi6uvLruqd6hGZEOQWiqiwjq3ZZH9cDlYLW/Vfd:InzaVaiwo23M6u+qMhGZhxd1QzMTkR2

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bft

Decoy

edenicities.com

buntingfordhomeservices.com

nuanceproducoes.com

divasinspire.com

capiturn.com

zbjsn.com

thegioicaytrongnha.com

featherventure.com

onbrandtrading.com

sanguoban.com

doorman.pro

ourhomie.net

iwassickonholiday.com

mrcskin.com

reallycoolmask.com

tkrbeautyinstitut.com

keytomiami.com

sesliduybeni.com

asherwebber.com

starkweatherwindows.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be89164ecb2619c73b8aa49503c87ab3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\be89164ecb2619c73b8aa49503c87ab3_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fDGILf" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFE4C.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1884
    • C:\Users\Admin\AppData\Local\Temp\be89164ecb2619c73b8aa49503c87ab3_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\be89164ecb2619c73b8aa49503c87ab3_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpFE4C.tmp

    Filesize

    1KB

    MD5

    6d9ff37df8b0a8788146a01055a8fb6a

    SHA1

    c1a285f449c8b242cc87f04a89ce076860fb74fd

    SHA256

    5d10ae8b114ebb41e5b9f3fda2d4503b96d2ea6d52987d8767585d399e933e54

    SHA512

    0a1305cc3bd33a912012c60e29da8d9a998587739828053130164e3d03d2cf1e27fe2f1ec97c7aac163ba4112405dfc9eb429735a9592a8f7f2a81753a996bdb

  • memory/2820-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2820-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2820-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2820-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2820-17-0x00000000008B0000-0x0000000000BB3000-memory.dmp

    Filesize

    3.0MB

  • memory/2820-19-0x00000000008B0000-0x0000000000BB3000-memory.dmp

    Filesize

    3.0MB

  • memory/2988-2-0x00000000741F0000-0x000000007479B000-memory.dmp

    Filesize

    5.7MB

  • memory/2988-3-0x00000000741F0000-0x000000007479B000-memory.dmp

    Filesize

    5.7MB

  • memory/2988-4-0x00000000741F0000-0x000000007479B000-memory.dmp

    Filesize

    5.7MB

  • memory/2988-1-0x00000000741F0000-0x000000007479B000-memory.dmp

    Filesize

    5.7MB

  • memory/2988-0-0x00000000741F1000-0x00000000741F2000-memory.dmp

    Filesize

    4KB

  • memory/2988-18-0x00000000741F0000-0x000000007479B000-memory.dmp

    Filesize

    5.7MB