Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 09:02

General

  • Target

    c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    c064ec37ffd4521397a436a9d0c3da18

  • SHA1

    03ba9be491d49752464ffa0755f0d8926e1925e7

  • SHA256

    a308003882167974d1a1f6334f0f9ee1599c50d33ec2883c856de84bf82365f4

  • SHA512

    2186f2f8f28efdde84d196468b00f5df27417b65a10ba6589ee0e57d30ffef121ec04973db8ffc7d6ec935e8bdcf0a98d72cad057f131e6caf7c7455d72379ba

  • SSDEEP

    24576:f9aok2Jbtfcp5l3E5zXVHjx9NMezB3xmSj:f9aSho45xDvZh

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

an

Decoy

setzesegel.com

freeyrself.com

searchshoppingonline.com

tv16282.info

unitedtur.com

168jlb.com

blockee.info

ryd5.com

kucun108.com

castcmi.red

ufc202.info

goldendawnequipment.com

anlatacaklarimvar.com

szgty.info

realtorlubbock.com

digitalumsetzbar.com

buy9voltblaster.com

naughtytingz.com

phstructuredwater.com

energettic.download

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Users\Admin\AppData\Local\Temp\c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c064ec37ffd4521397a436a9d0c3da18_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:8
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:3656
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\SysWOW64\svchost.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\SysWOW64\diskperf.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/8-9-0x0000000000E80000-0x00000000011CA000-memory.dmp

      Filesize

      3.3MB

    • memory/8-6-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/8-10-0x0000000000840000-0x0000000000854000-memory.dmp

      Filesize

      80KB

    • memory/8-12-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/856-0-0x00000000023C0000-0x00000000023C1000-memory.dmp

      Filesize

      4KB

    • memory/856-1-0x0000000000400000-0x000000000051F000-memory.dmp

      Filesize

      1.1MB

    • memory/856-7-0x0000000000400000-0x000000000051F000-memory.dmp

      Filesize

      1.1MB

    • memory/856-2-0x00000000023C0000-0x00000000023C1000-memory.dmp

      Filesize

      4KB

    • memory/3396-11-0x0000000002A00000-0x0000000002ACF000-memory.dmp

      Filesize

      828KB

    • memory/3396-16-0x0000000002A00000-0x0000000002ACF000-memory.dmp

      Filesize

      828KB

    • memory/3396-20-0x0000000008A70000-0x0000000008BD8000-memory.dmp

      Filesize

      1.4MB

    • memory/3396-21-0x0000000008A70000-0x0000000008BD8000-memory.dmp

      Filesize

      1.4MB

    • memory/3396-23-0x0000000008A70000-0x0000000008BD8000-memory.dmp

      Filesize

      1.4MB

    • memory/4700-15-0x0000000000B70000-0x0000000000B7E000-memory.dmp

      Filesize

      56KB

    • memory/4700-13-0x0000000000B70000-0x0000000000B7E000-memory.dmp

      Filesize

      56KB