Analysis

  • max time kernel
    145s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 14:17

General

  • Target

    c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe

  • Size

    958KB

  • MD5

    c8fda80e652d365bc5ceb4e065c51ee3

  • SHA1

    c3e984e1e8a7421c17e3ecd3a4e3a4ba183ae562

  • SHA256

    4b8ad4a9d84c014358222a91b7a8d3b7f6b3a5853750d84e1d1e677a5bc9e9ff

  • SHA512

    edf9e0ca4d76dfe023a309e68ad06d25e960f6173b07d132908914a165f6f32b12280c0d400f86637594f3d28317170cfce134d0154346a4a6376a27acb9c50a

  • SSDEEP

    12288:d/UQS1E+wSE1vfy2dJzOP9vExIH0h1zCShca7Av7Q292QOdGHRp69:dewSWfySzOPux0keSG62Dxz69

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ca

Decoy

jphmo.com

planbmx.com

jcygtpu.com

mindpathvideo.net

napavalleymysore.com

bitkanji.com

thecologne.zone

getreadyherenow6.info

cybersecfirst.com

celtflowers.com

zfk3.net

thecheapest.review

1b4tenhell.men

padaria2irmaos.com

azimitrdg.com

oldschoolnate.com

customhighperformance.com

classicrockandgems.com

marvinreynoso.com

stuffnsit.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1300
    • C:\Windows\SysWOW64\systray.exe
      "C:\Windows\SysWOW64\systray.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3008

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1204-12-0x0000000004CE0000-0x0000000004D9D000-memory.dmp

          Filesize

          756KB

        • memory/1204-17-0x0000000004CE0000-0x0000000004D9D000-memory.dmp

          Filesize

          756KB

        • memory/1300-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1300-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1300-6-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1300-11-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1300-13-0x0000000000430000-0x0000000000497000-memory.dmp

          Filesize

          412KB

        • memory/2600-16-0x0000000000BD0000-0x0000000000BD5000-memory.dmp

          Filesize

          20KB

        • memory/2600-14-0x0000000000BD0000-0x0000000000BD5000-memory.dmp

          Filesize

          20KB

        • memory/2716-3-0x00000000003B0000-0x00000000003BC000-memory.dmp

          Filesize

          48KB

        • memory/2716-4-0x00000000006E0000-0x000000000070A000-memory.dmp

          Filesize

          168KB

        • memory/2716-0-0x000000007441E000-0x000000007441F000-memory.dmp

          Filesize

          4KB

        • memory/2716-2-0x0000000000570000-0x00000000005AA000-memory.dmp

          Filesize

          232KB

        • memory/2716-1-0x0000000000270000-0x000000000032A000-memory.dmp

          Filesize

          744KB