Analysis

  • max time kernel
    137s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 22:27

General

  • Target

    c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe

  • Size

    955KB

  • MD5

    c1b83daeb8757d575a940c65bccb0d1b

  • SHA1

    857e57fbce938345d8baea856ce232179627e995

  • SHA256

    c1191a2395a4bcd7c12c63ed628be5c3df1ab0d0b51d46932716fb0c917c0dde

  • SHA512

    8a8f80c1de2c2fed85091160b1c6c3912b43ed5627d05abb7a8a713a41bf1edfac06e8bd6023925a82b56eafa5340ed4880705588c5e6b405bf70e6cd7b8c3e9

  • SSDEEP

    12288:/6FSCKAIMqmB0a08IEvs81TMe1vJrW5/n8T8S/5uEJ52:a1fI00z8IR81Tdx+8oE3J

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

mdi

Decoy

uproarcatalyst.com

cruisessafaris.com

simplethreads.net

ncsetup.com

dthengjia.com

heyfig.com

inventqa.com

mentoriareset.com

a70a.com

ncolesrose.com

culasarsa.com

southdocknj.com

pistrinalove.com

championvanleasing.com

mazda40.com

lujoscenter.com

wgsol.com

iheart2d.com

olympiccarpetcare.com

aiored.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\taoLqqCfkCGUj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC985.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:3248
    • C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c1b83daeb8757d575a940c65bccb0d1b_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpC985.tmp

    Filesize

    1KB

    MD5

    b8ac8f4ef059c7a6ad037dc9d93a22f8

    SHA1

    b9fb185d831b3b1c307fbd0128cb8b876e4713cd

    SHA256

    9653954cb5c4168944b3be4067d4dde0d942dad2be8fc5affb7455e9cb82498e

    SHA512

    be7c15baf8d370f1fc5dac8e73c42e09fceb91916a29023c50df2fd7ef12aecc4d8de045f11ee2a566849795ef9e895845c7aefb6ddc24cccafb1bac80bf46f5

  • memory/2504-20-0x0000000001790000-0x0000000001ADA000-memory.dmp

    Filesize

    3.3MB

  • memory/2504-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4416-4-0x0000000005860000-0x00000000058F2000-memory.dmp

    Filesize

    584KB

  • memory/4416-0-0x00000000748BE000-0x00000000748BF000-memory.dmp

    Filesize

    4KB

  • memory/4416-5-0x0000000005780000-0x000000000578A000-memory.dmp

    Filesize

    40KB

  • memory/4416-6-0x0000000005AB0000-0x0000000005B06000-memory.dmp

    Filesize

    344KB

  • memory/4416-7-0x00000000748B0000-0x0000000075060000-memory.dmp

    Filesize

    7.7MB

  • memory/4416-8-0x0000000005AA0000-0x0000000005AAA000-memory.dmp

    Filesize

    40KB

  • memory/4416-9-0x00000000748BE000-0x00000000748BF000-memory.dmp

    Filesize

    4KB

  • memory/4416-10-0x00000000748B0000-0x0000000075060000-memory.dmp

    Filesize

    7.7MB

  • memory/4416-11-0x0000000001640000-0x00000000016A2000-memory.dmp

    Filesize

    392KB

  • memory/4416-3-0x0000000005E10000-0x00000000063B4000-memory.dmp

    Filesize

    5.6MB

  • memory/4416-2-0x00000000057C0000-0x000000000585C000-memory.dmp

    Filesize

    624KB

  • memory/4416-19-0x00000000748B0000-0x0000000075060000-memory.dmp

    Filesize

    7.7MB

  • memory/4416-1-0x0000000000CD0000-0x0000000000DC6000-memory.dmp

    Filesize

    984KB