Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 08:41

General

  • Target

    c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe

  • Size

    847KB

  • MD5

    c68506d23178bedf545bb2b028d8572e

  • SHA1

    3b4d7f2827f3c11ad73596943a19707d61e92bf5

  • SHA256

    17de42648d49e21ed411c460fa0c805443e1898e21114beb8ea7301da3ee6b31

  • SHA512

    bf24fcfc36f96eeedeab6cfc222fcc34d8925e29fbdef5fc57ae002237d4202897e2b062ea0fe9552a5514802bb4289ed8a4c6522234d1504cc953acca7f39f2

  • SSDEEP

    12288:8ayc8dtxZjKBVbBstxucrzyUYG2gmmz/PXtgobWmpfb4dstkoHQH8mlLeOIP:qPtxFKXboucS5vcz/2Cpvko2pxRc

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

3nk4

Decoy

teresaanaya.com

byronhobbs.com

altiizgara.com

reignsponsibly.com

kanistones.com

clickpk.site

aizzainvestments.com

bpqbq.com

openfitxbstretch.com

blackvoicesstore.com

yousefzaid.com

verdeaccounting.com

independentthoughtshow.com

fainlywatchdog.com

elreventondelsabor.com

spiceyourfood.com

1277hb.com

cesttoni.com

portalngs.com

turismoplayas.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c68506d23178bedf545bb2b028d8572e_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1576-4-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1576-7-0x0000000000910000-0x0000000000C13000-memory.dmp

    Filesize

    3.0MB

  • memory/2008-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2008-2-0x0000000000390000-0x00000000003A2000-memory.dmp

    Filesize

    72KB

  • memory/2008-1-0x0000000000390000-0x00000000003A2000-memory.dmp

    Filesize

    72KB

  • memory/2008-5-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2008-3-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB