Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 14:17

General

  • Target

    c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe

  • Size

    958KB

  • MD5

    c8fda80e652d365bc5ceb4e065c51ee3

  • SHA1

    c3e984e1e8a7421c17e3ecd3a4e3a4ba183ae562

  • SHA256

    4b8ad4a9d84c014358222a91b7a8d3b7f6b3a5853750d84e1d1e677a5bc9e9ff

  • SHA512

    edf9e0ca4d76dfe023a309e68ad06d25e960f6173b07d132908914a165f6f32b12280c0d400f86637594f3d28317170cfce134d0154346a4a6376a27acb9c50a

  • SSDEEP

    12288:d/UQS1E+wSE1vfy2dJzOP9vExIH0h1zCShca7Av7Q292QOdGHRp69:dewSWfySzOPux0keSG62Dxz69

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ca

Decoy

jphmo.com

planbmx.com

jcygtpu.com

mindpathvideo.net

napavalleymysore.com

bitkanji.com

thecologne.zone

getreadyherenow6.info

cybersecfirst.com

celtflowers.com

zfk3.net

thecheapest.review

1b4tenhell.men

padaria2irmaos.com

azimitrdg.com

oldschoolnate.com

customhighperformance.com

classicrockandgems.com

marvinreynoso.com

stuffnsit.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Formbook payload 5 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Users\Admin\AppData\Local\Temp\c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c8fda80e652d365bc5ceb4e065c51ee3_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2124
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:64
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2308
      • C:\Windows\SysWOW64\cmd.exe
        /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DB1

    Filesize

    40KB

    MD5

    a182561a527f929489bf4b8f74f65cd7

    SHA1

    8cd6866594759711ea1836e86a5b7ca64ee8911f

    SHA256

    42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

    SHA512

    9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

  • C:\Users\Admin\AppData\Roaming\53MR1SEE\53Mlogim.jpeg

    Filesize

    84KB

    MD5

    6a846b0fd21066712d37d711bf7e4336

    SHA1

    ed14c219640531d332f25e401ccf4cc44910ebc2

    SHA256

    cebcc3fed2e0b04ee181c670beb620b0bc069e6953ff22831c51c0f1f33437a0

    SHA512

    3d9121c170601e1a9f6d012e77297b4b8595a3f221b75dca7b10cdd87016e540678570811451aad697c3c8879fb8879591266e7f3276775edfad5bb241635822

  • C:\Users\Admin\AppData\Roaming\53MR1SEE\53Mlogrg.ini

    Filesize

    38B

    MD5

    4aadf49fed30e4c9b3fe4a3dd6445ebe

    SHA1

    1e332822167c6f351b99615eada2c30a538ff037

    SHA256

    75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

    SHA512

    eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

  • C:\Users\Admin\AppData\Roaming\53MR1SEE\53Mlogri.ini

    Filesize

    40B

    MD5

    d63a82e5d81e02e399090af26db0b9cb

    SHA1

    91d0014c8f54743bba141fd60c9d963f869d76c9

    SHA256

    eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

    SHA512

    38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

  • C:\Users\Admin\AppData\Roaming\53MR1SEE\53Mlogrv.ini

    Filesize

    872B

    MD5

    bbc41c78bae6c71e63cb544a6a284d94

    SHA1

    33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

    SHA256

    ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

    SHA512

    0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

  • memory/64-27-0x0000000001100000-0x000000000112A000-memory.dmp

    Filesize

    168KB

  • memory/64-23-0x0000000003100000-0x000000000344A000-memory.dmp

    Filesize

    3.3MB

  • memory/64-25-0x0000000002FD0000-0x0000000003063000-memory.dmp

    Filesize

    588KB

  • memory/64-22-0x0000000001100000-0x000000000112A000-memory.dmp

    Filesize

    168KB

  • memory/64-19-0x0000000000B10000-0x0000000000B22000-memory.dmp

    Filesize

    72KB

  • memory/64-21-0x0000000000B10000-0x0000000000B22000-memory.dmp

    Filesize

    72KB

  • memory/64-17-0x0000000000B10000-0x0000000000B22000-memory.dmp

    Filesize

    72KB

  • memory/1696-3-0x0000000003470000-0x000000000347C000-memory.dmp

    Filesize

    48KB

  • memory/1696-2-0x0000000003310000-0x000000000334A000-memory.dmp

    Filesize

    232KB

  • memory/1696-5-0x0000000005C20000-0x0000000005CBC000-memory.dmp

    Filesize

    624KB

  • memory/1696-1-0x0000000000FC0000-0x000000000107A000-memory.dmp

    Filesize

    744KB

  • memory/1696-0-0x000000007441E000-0x000000007441F000-memory.dmp

    Filesize

    4KB

  • memory/1696-4-0x0000000005980000-0x00000000059AA000-memory.dmp

    Filesize

    168KB

  • memory/2124-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2124-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3452-24-0x0000000008AD0000-0x0000000008C5D000-memory.dmp

    Filesize

    1.6MB

  • memory/3452-32-0x0000000008280000-0x0000000008352000-memory.dmp

    Filesize

    840KB

  • memory/3452-31-0x0000000008280000-0x0000000008352000-memory.dmp

    Filesize

    840KB

  • memory/3452-29-0x0000000008280000-0x0000000008352000-memory.dmp

    Filesize

    840KB

  • memory/3452-14-0x0000000002DA0000-0x0000000002EE8000-memory.dmp

    Filesize

    1.3MB

  • memory/3452-13-0x0000000008AD0000-0x0000000008C5D000-memory.dmp

    Filesize

    1.6MB

  • memory/3452-10-0x0000000002DA0000-0x0000000002EE8000-memory.dmp

    Filesize

    1.3MB