Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30-08-2024 15:20

General

  • Target

    cb198e943e5c25204869a0e0d2a0d964_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    cb198e943e5c25204869a0e0d2a0d964

  • SHA1

    96c3810223482ed17cff242e5fef92b5e8277152

  • SHA256

    f85b0ebf72b1230d8582028ef03f438d04996f2d227f5d3f3af40694a56a724e

  • SHA512

    b27fe38702adbc33ed13f6b8e4ce3d2deb47e154338d6fc67996965c82fdb7223669db20a07a96c240504ef1e4c9c1294a8df722d3969243414790ef7d616140

  • SSDEEP

    24576:vo9iLCQbWxKSYcSIsu4kUpcZcAGSOAYpwcG9e9O1eR:vbbQNCID4kUS6sOJVWCOY

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cmsr

Decoy

dahlia-dolls.com

iamawife.com

gardunomx.com

roweelitetrucking.com

asapvk.com

strategieslimited.com

healthyweathorganics.com

wedding-gallery.net

fastoffer.online

biolab33.cloud

los40delocta.com

charliepaton.com

jenpaddock.com

zzmweb.com

poetarts.com

techwork4u.com

tracylynpropp.com

rkbodyfit.site

migaleriapanama.com

cosmostco.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb198e943e5c25204869a0e0d2a0d964_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cb198e943e5c25204869a0e0d2a0d964_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\cb198e943e5c25204869a0e0d2a0d964_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\cb198e943e5c25204869a0e0d2a0d964_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2072-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2072-15-0x0000000000700000-0x0000000000A03000-memory.dmp

    Filesize

    3.0MB

  • memory/2072-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2072-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2072-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2192-3-0x0000000000580000-0x0000000000598000-memory.dmp

    Filesize

    96KB

  • memory/2192-6-0x0000000000E90000-0x0000000000EE8000-memory.dmp

    Filesize

    352KB

  • memory/2192-5-0x0000000073E60000-0x000000007454E000-memory.dmp

    Filesize

    6.9MB

  • memory/2192-4-0x0000000073E6E000-0x0000000073E6F000-memory.dmp

    Filesize

    4KB

  • memory/2192-0-0x0000000073E6E000-0x0000000073E6F000-memory.dmp

    Filesize

    4KB

  • memory/2192-2-0x0000000073E60000-0x000000007454E000-memory.dmp

    Filesize

    6.9MB

  • memory/2192-14-0x0000000073E60000-0x000000007454E000-memory.dmp

    Filesize

    6.9MB

  • memory/2192-1-0x0000000001370000-0x0000000001580000-memory.dmp

    Filesize

    2.1MB