Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 22:27

General

  • Target

    c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe

  • Size

    955KB

  • MD5

    c1b83daeb8757d575a940c65bccb0d1b

  • SHA1

    857e57fbce938345d8baea856ce232179627e995

  • SHA256

    c1191a2395a4bcd7c12c63ed628be5c3df1ab0d0b51d46932716fb0c917c0dde

  • SHA512

    8a8f80c1de2c2fed85091160b1c6c3912b43ed5627d05abb7a8a713a41bf1edfac06e8bd6023925a82b56eafa5340ed4880705588c5e6b405bf70e6cd7b8c3e9

  • SSDEEP

    12288:/6FSCKAIMqmB0a08IEvs81TMe1vJrW5/n8T8S/5uEJ52:a1fI00z8IR81Tdx+8oE3J

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

mdi

Decoy

uproarcatalyst.com

cruisessafaris.com

simplethreads.net

ncsetup.com

dthengjia.com

heyfig.com

inventqa.com

mentoriareset.com

a70a.com

ncolesrose.com

culasarsa.com

southdocknj.com

pistrinalove.com

championvanleasing.com

mazda40.com

lujoscenter.com

wgsol.com

iheart2d.com

olympiccarpetcare.com

aiored.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:332
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\taoLqqCfkCGUj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDD64.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2868
    • C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpDD64.tmp

    Filesize

    1KB

    MD5

    1415b939b6f997ec4c23151aa5043f91

    SHA1

    a4be381c678a9f451b33cbdbd45f6ee9b6b2fedd

    SHA256

    2b28a055611bdfe33cabc1c87fd8c487ebbcd389bf919bafadf33473093d3784

    SHA512

    05970d465690e752e2a0b27fff1c80d1af95b5f3f8af43ba928ab3fca4196e0419ae96d6b3216a3913d2e562b24b1cf4e04ea25298f1afaebff6dc1befc90d2f

  • memory/332-6-0x0000000004EB0000-0x0000000004F12000-memory.dmp

    Filesize

    392KB

  • memory/332-2-0x0000000074BC0000-0x00000000752AE000-memory.dmp

    Filesize

    6.9MB

  • memory/332-3-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/332-4-0x0000000074BCE000-0x0000000074BCF000-memory.dmp

    Filesize

    4KB

  • memory/332-5-0x0000000074BC0000-0x00000000752AE000-memory.dmp

    Filesize

    6.9MB

  • memory/332-0-0x0000000074BCE000-0x0000000074BCF000-memory.dmp

    Filesize

    4KB

  • memory/332-1-0x0000000000CE0000-0x0000000000DD6000-memory.dmp

    Filesize

    984KB

  • memory/332-18-0x0000000074BC0000-0x00000000752AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2732-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2732-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2732-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2732-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2732-17-0x0000000000910000-0x0000000000C13000-memory.dmp

    Filesize

    3.0MB