Analysis

  • max time kernel
    134s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-08-2024 15:20

General

  • Target

    cb198e943e5c25204869a0e0d2a0d964_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    cb198e943e5c25204869a0e0d2a0d964

  • SHA1

    96c3810223482ed17cff242e5fef92b5e8277152

  • SHA256

    f85b0ebf72b1230d8582028ef03f438d04996f2d227f5d3f3af40694a56a724e

  • SHA512

    b27fe38702adbc33ed13f6b8e4ce3d2deb47e154338d6fc67996965c82fdb7223669db20a07a96c240504ef1e4c9c1294a8df722d3969243414790ef7d616140

  • SSDEEP

    24576:vo9iLCQbWxKSYcSIsu4kUpcZcAGSOAYpwcG9e9O1eR:vbbQNCID4kUS6sOJVWCOY

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cmsr

Decoy

dahlia-dolls.com

iamawife.com

gardunomx.com

roweelitetrucking.com

asapvk.com

strategieslimited.com

healthyweathorganics.com

wedding-gallery.net

fastoffer.online

biolab33.cloud

los40delocta.com

charliepaton.com

jenpaddock.com

zzmweb.com

poetarts.com

techwork4u.com

tracylynpropp.com

rkbodyfit.site

migaleriapanama.com

cosmostco.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb198e943e5c25204869a0e0d2a0d964_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cb198e943e5c25204869a0e0d2a0d964_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\cb198e943e5c25204869a0e0d2a0d964_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\cb198e943e5c25204869a0e0d2a0d964_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/380-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/380-15-0x0000000001410000-0x000000000175A000-memory.dmp

    Filesize

    3.3MB

  • memory/1252-6-0x0000000005A50000-0x0000000005AA6000-memory.dmp

    Filesize

    344KB

  • memory/1252-3-0x0000000005E00000-0x00000000063A4000-memory.dmp

    Filesize

    5.6MB

  • memory/1252-4-0x0000000005850000-0x00000000058E2000-memory.dmp

    Filesize

    584KB

  • memory/1252-5-0x00000000059E0000-0x00000000059EA000-memory.dmp

    Filesize

    40KB

  • memory/1252-0-0x0000000074FDE000-0x0000000074FDF000-memory.dmp

    Filesize

    4KB

  • memory/1252-7-0x0000000074FD0000-0x0000000075780000-memory.dmp

    Filesize

    7.7MB

  • memory/1252-8-0x0000000005A00000-0x0000000005A18000-memory.dmp

    Filesize

    96KB

  • memory/1252-9-0x0000000074FDE000-0x0000000074FDF000-memory.dmp

    Filesize

    4KB

  • memory/1252-10-0x0000000074FD0000-0x0000000075780000-memory.dmp

    Filesize

    7.7MB

  • memory/1252-11-0x0000000006650000-0x00000000066A8000-memory.dmp

    Filesize

    352KB

  • memory/1252-2-0x00000000057B0000-0x000000000584C000-memory.dmp

    Filesize

    624KB

  • memory/1252-14-0x0000000074FD0000-0x0000000075780000-memory.dmp

    Filesize

    7.7MB

  • memory/1252-1-0x0000000000D10000-0x0000000000F20000-memory.dmp

    Filesize

    2.1MB