Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 23:01

General

  • Target

    d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe

  • Size

    873KB

  • MD5

    d302a55d33c34c382c7518fdefd49efa

  • SHA1

    0601338d74705de83a331a7a60b7e175bc931329

  • SHA256

    34eeebc4197df0980b621253c336662f3868ccc65a5f99a832d47751d4d5384e

  • SHA512

    03d34237a54e0f32b400a49ba497de75dcf9b0c434c0826a8efa40bb4993c33431c8be7a555cf5f16f5ead02ab62fc0805144ba550da916624ca697819012a26

  • SSDEEP

    12288:8Db7BqrErn/mxx7E6vMJaxKwWoFJm6y2o/Yc4/P2x1AFWqjwomGgosFI0+jN7RS8:8FBrny7d7eqq2Z32osomGuFI0+jN7

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

3nk4

Decoy

teresaanaya.com

byronhobbs.com

altiizgara.com

reignsponsibly.com

kanistones.com

clickpk.site

aizzainvestments.com

bpqbq.com

openfitxbstretch.com

blackvoicesstore.com

yousefzaid.com

verdeaccounting.com

independentthoughtshow.com

fainlywatchdog.com

elreventondelsabor.com

spiceyourfood.com

1277hb.com

cesttoni.com

portalngs.com

turismoplayas.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Users\Admin\AppData\Local\Temp\d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d302a55d33c34c382c7518fdefd49efa_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1288-4-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1288-7-0x00000000008B0000-0x0000000000BB3000-memory.dmp

    Filesize

    3.0MB

  • memory/2828-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2828-2-0x0000000000270000-0x0000000000280000-memory.dmp

    Filesize

    64KB

  • memory/2828-1-0x0000000000270000-0x0000000000280000-memory.dmp

    Filesize

    64KB

  • memory/2828-3-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2828-5-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB