Analysis

  • max time kernel
    132s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 11:53

General

  • Target

    be89164ecb2619c73b8aa49503c87ab3_JaffaCakes118.exe

  • Size

    405KB

  • MD5

    be89164ecb2619c73b8aa49503c87ab3

  • SHA1

    4527ba51a42f2e99a30fa14c0cbac17adb1a4c61

  • SHA256

    fe76d90027602729ed2e7d13c8db252f609f0c99b3c3bc263ac43df01ac93dbe

  • SHA512

    08e8f30f09d79978c49fbae930b305829f63b59655bccb07cc8fc2c7de7c32df2d013d82d1cd931670a0bd8984d08df36ac41186ad59f4a2a3521d6750d92f34

  • SSDEEP

    6144:nInzaVaiwTFpxzm23Kr389xVWoi6uvLruqd6hGZEOQWiqiwjq3ZZH9cDlYLW/Vfd:InzaVaiwo23M6u+qMhGZhxd1QzMTkR2

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bft

Decoy

edenicities.com

buntingfordhomeservices.com

nuanceproducoes.com

divasinspire.com

capiturn.com

zbjsn.com

thegioicaytrongnha.com

featherventure.com

onbrandtrading.com

sanguoban.com

doorman.pro

ourhomie.net

iwassickonholiday.com

mrcskin.com

reallycoolmask.com

tkrbeautyinstitut.com

keytomiami.com

sesliduybeni.com

asherwebber.com

starkweatherwindows.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be89164ecb2619c73b8aa49503c87ab3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\be89164ecb2619c73b8aa49503c87ab3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fDGILf" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCF03.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2596
    • C:\Users\Admin\AppData\Local\Temp\be89164ecb2619c73b8aa49503c87ab3_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\be89164ecb2619c73b8aa49503c87ab3_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpCF03.tmp

    Filesize

    1KB

    MD5

    66a24f6ef82177fd00b23fa7d3a0b582

    SHA1

    d2167499bc8c9ff2f6627bfe7b7f6b2bd8f55d74

    SHA256

    e81d8dface0d14eae2267c1929b30adab0aa796616f1437fba115acb6e5dba2d

    SHA512

    3208a28ff33f0debb42579651a382a413662014a648becd6cfb4ca1e175dda5153d25ba48a431184286062c3f4c834c2e0f4a969410952c50a9440d8bc0ce05c

  • memory/3208-0-0x00000000746D2000-0x00000000746D3000-memory.dmp

    Filesize

    4KB

  • memory/3208-1-0x00000000746D0000-0x0000000074C81000-memory.dmp

    Filesize

    5.7MB

  • memory/3208-2-0x00000000746D0000-0x0000000074C81000-memory.dmp

    Filesize

    5.7MB

  • memory/3208-3-0x00000000746D2000-0x00000000746D3000-memory.dmp

    Filesize

    4KB

  • memory/3208-4-0x00000000746D0000-0x0000000074C81000-memory.dmp

    Filesize

    5.7MB

  • memory/3208-12-0x00000000746D0000-0x0000000074C81000-memory.dmp

    Filesize

    5.7MB

  • memory/4296-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4296-13-0x0000000000FD0000-0x000000000131A000-memory.dmp

    Filesize

    3.3MB

  • memory/4296-14-0x0000000000FD0000-0x000000000131A000-memory.dmp

    Filesize

    3.3MB