Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 15:12

General

  • Target

    d239aa442968f1ecd78ec3fead79f1c5_JaffaCakes118.exe

  • Size

    1015KB

  • MD5

    d239aa442968f1ecd78ec3fead79f1c5

  • SHA1

    28d69f73c75a419ced1bed487f14ea09dab85b7a

  • SHA256

    9701e87ea4beda798663d1e09569103cc9dcf517e2e9ad41d0f9304247cf2f1c

  • SHA512

    c030f718b976b856d2aad62f9de5d7298139bd2dc718c796693007ec59af7d985ec1225a278715a224a2fde20421867f6d318acba4968854083e8085828b1395

  • SSDEEP

    24576:BWzf2ryot2cyzmPLtEux5fXDj7RplYRIVcfc2:BWCMfG1xj1plYq9

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gbs

Decoy

luxuryinstalls.com

thatszesty.com

distributed.team

cilaf.com

aspenonmain.com

clivehamiltonstone.com

alternadoresdelta.com

tortises.com

rivenguard.mobi

ileverageagency.com

etcglobaltrading.com

thetotalbusinesssolution.com

referralfromeap.com

influencermonk.com

shopartthekid.com

thestorycollectorinc.com

kichunclub.com

virginiaparent.com

comptoirsolis.com

wwwthenewyorktimes.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d239aa442968f1ecd78ec3fead79f1c5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d239aa442968f1ecd78ec3fead79f1c5_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZaIDWzKCuyKIFR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp58DA.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1664
    • C:\Users\Admin\AppData\Local\Temp\d239aa442968f1ecd78ec3fead79f1c5_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d239aa442968f1ecd78ec3fead79f1c5_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp58DA.tmp

    Filesize

    1KB

    MD5

    fc50ec29251b2ddc17eb5f57f4cab7b0

    SHA1

    5e93a5854a7cdc0d81433eef2d7a7c69c8ed3274

    SHA256

    f169b1b66e9bc4d8f190659c1b237398c9179c560c26d059109a69222c437baa

    SHA512

    cc76a5fb46b0e43800b557bfe7cf8c887fa232bad6ab20d86d89c2b47cf449ffa80451345e9e561c485257522380f43a7bcedf0616fd7d74c2c921a09d6bd2d7

  • memory/1764-18-0x0000000000850000-0x0000000000B53000-memory.dmp

    Filesize

    3.0MB

  • memory/1764-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1764-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1764-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1764-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2700-3-0x0000000000A70000-0x0000000000A7A000-memory.dmp

    Filesize

    40KB

  • memory/2700-6-0x0000000004B20000-0x0000000004B82000-memory.dmp

    Filesize

    392KB

  • memory/2700-5-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-4-0x000000007481E000-0x000000007481F000-memory.dmp

    Filesize

    4KB

  • memory/2700-0-0x000000007481E000-0x000000007481F000-memory.dmp

    Filesize

    4KB

  • memory/2700-2-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-17-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-1-0x00000000010E0000-0x00000000011E4000-memory.dmp

    Filesize

    1.0MB