Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-08-2024 23:09

General

  • Target

    cbd7b03a1410f9d9c404a33020c2c49f_JaffaCakes118.msi

  • Size

    484KB

  • MD5

    cbd7b03a1410f9d9c404a33020c2c49f

  • SHA1

    46873e92417016950176968517a80cd4f83f2927

  • SHA256

    659b0101cf2a80010a2254f632a3964ca0917c65694e6cdcdb258f2ea36c30b4

  • SHA512

    8b4163b6d94a3fdc71331461626bf9b6a4af1687e9f155a55122d6152ed12e1d2880c4dd01b6b3ee7f953fed247e35b09d6b28a78c115b4dae8488e451767c2c

  • SSDEEP

    12288:uE4cI068+xWfFSAUadblygLj69i4r8dO2C7qM:uEB6kNBlygy9brsO2C7qM

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ai

Decoy

theapschool.com

riseupfloridakeys.com

xn--mgbb2awa9dm20i.com

apnee-coach.com

christianmarketinggifts.com

eurothereum.biz

solutionfull.com

equifaxqsecurity2017.com

roboeye-tech.com

living-isar.immo

cable-online-zone.sale

parfumirza.com

civilizationsprice.com

zealasia.com

billet-bateau-tanger.com

andrewkurtsummers.net

darylandkaitlyn.com

ddaak.com

seattlepetadventures.com

iopuern.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\cbd7b03a1410f9d9c404a33020c2c49f_JaffaCakes118.msi
      2⤵
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2548
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Installer\MSI12C9.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4492
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4288
    • C:\Windows\Installer\MSI12C9.tmp
      "C:\Windows\Installer\MSI12C9.tmp"
      2⤵
      • Suspicious use of SetThreadContext
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Windows\Installer\MSI12C9.tmp
        "C:\Windows\Installer\MSI12C9.tmp"
        3⤵
        • Suspicious use of SetThreadContext
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1908
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e5811a2.rbs

    Filesize

    663B

    MD5

    10f5ad8b55597e6a1805285ce0fb1276

    SHA1

    4be83f699182d37155258c2cb4ef552eaacccd37

    SHA256

    14b49032d94039e7bfeb8b75d8988517a0dffa844e71b24c016174975d6fdab2

    SHA512

    652ec948fa01a1f34e8b65a09326d173a44a226e19a7b4b96d92c4760e273605ffddfa6ddedec18e0217c2c35e547c95716c78daab1f5d10137c06d1a568346f

  • C:\Windows\Installer\MSI12C9.tmp

    Filesize

    457KB

    MD5

    d69de5541de05d308fdd0c50b7497b34

    SHA1

    01ce85209b6eeaf53b3e63648927bcd3b6bd2d70

    SHA256

    c7eed03a4b3a89f0a0fbbf3eed98fa639f7187a31a5b0e8c7a97d0278b2d159c

    SHA512

    f2a9a7590d8f36402cca038ce9235ad6f91f41c63cb0ce4dc9b51b6f831f1a54dc31abe018ac41c941eb96f1e3d20f6dba938767abb6888a478334164cb41fe0

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    23.7MB

    MD5

    97afcc518e7e43caf706e02de735c43b

    SHA1

    1865440dd13c3129d58d60e3cad981389114985f

    SHA256

    a10f16559926d850996a448fc5e0b5c4a177f6f912214aeb2a71f02343c994f4

    SHA512

    ce92acc6ea5639286d6f184f7fedaf096e1843f8dd7ab620aba8391ffc918261313c25b156f50cbe9ff7248f91c513c5aaec731135ca2790b1731d1172c9e81f

  • \??\Volume{fa35ad82-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{185cb2fd-6c8d-4a70-809b-66d4fae76b3a}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    19e8ddb5a06e10529e462a9147cf335a

    SHA1

    a50e741c277a1f316e94016e94104445802892c3

    SHA256

    a0baa78607fc6043688201480f5f849d9dfe05477bf1a789ee25e1f2b03e2d61

    SHA512

    d2225333abf0ab207cc0e1b89f0ee910cdd10d80a9a323a2f8bf440ca7df959982ad07089c98cf25025d17da93c2e774758ee305918042aa924ea9889fcb5dce

  • memory/664-17-0x0000000004EA0000-0x0000000004ED0000-memory.dmp

    Filesize

    192KB

  • memory/664-16-0x0000000004EF0000-0x0000000004F82000-memory.dmp

    Filesize

    584KB

  • memory/664-15-0x00000000053A0000-0x0000000005944000-memory.dmp

    Filesize

    5.6MB

  • memory/664-18-0x0000000005240000-0x000000000525E000-memory.dmp

    Filesize

    120KB

  • memory/664-19-0x00000000028D0000-0x00000000028DA000-memory.dmp

    Filesize

    40KB

  • memory/664-20-0x0000000008770000-0x000000000880C000-memory.dmp

    Filesize

    624KB

  • memory/664-12-0x0000000000480000-0x00000000004FA000-memory.dmp

    Filesize

    488KB

  • memory/1900-38-0x0000000000F50000-0x0000000000F5C000-memory.dmp

    Filesize

    48KB

  • memory/1908-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3428-41-0x00000000093C0000-0x00000000094A6000-memory.dmp

    Filesize

    920KB