Analysis

  • max time kernel
    105s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 15:12

General

  • Target

    d239aa442968f1ecd78ec3fead79f1c5_JaffaCakes118.exe

  • Size

    1015KB

  • MD5

    d239aa442968f1ecd78ec3fead79f1c5

  • SHA1

    28d69f73c75a419ced1bed487f14ea09dab85b7a

  • SHA256

    9701e87ea4beda798663d1e09569103cc9dcf517e2e9ad41d0f9304247cf2f1c

  • SHA512

    c030f718b976b856d2aad62f9de5d7298139bd2dc718c796693007ec59af7d985ec1225a278715a224a2fde20421867f6d318acba4968854083e8085828b1395

  • SSDEEP

    24576:BWzf2ryot2cyzmPLtEux5fXDj7RplYRIVcfc2:BWCMfG1xj1plYq9

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gbs

Decoy

luxuryinstalls.com

thatszesty.com

distributed.team

cilaf.com

aspenonmain.com

clivehamiltonstone.com

alternadoresdelta.com

tortises.com

rivenguard.mobi

ileverageagency.com

etcglobaltrading.com

thetotalbusinesssolution.com

referralfromeap.com

influencermonk.com

shopartthekid.com

thestorycollectorinc.com

kichunclub.com

virginiaparent.com

comptoirsolis.com

wwwthenewyorktimes.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d239aa442968f1ecd78ec3fead79f1c5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d239aa442968f1ecd78ec3fead79f1c5_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZaIDWzKCuyKIFR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp41C2.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1756
    • C:\Users\Admin\AppData\Local\Temp\d239aa442968f1ecd78ec3fead79f1c5_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d239aa442968f1ecd78ec3fead79f1c5_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp41C2.tmp

    Filesize

    1KB

    MD5

    30a691314276ddec3aaf60317074014c

    SHA1

    3c448d74d6da0f7f8df9db42dafc7ecbc165773e

    SHA256

    f6538145112d2a4d5aca892f806d1ff0cf24935923eb1534b5f27b721605099b

    SHA512

    7acdd393d5c86b059e7dd2b7f8ce49c835d97b4f650a373b67ffcd1760575fdce10217d79e29d9017869187ca1158c556d6fa530033a951a9ffb134ffe41b49f

  • memory/1084-20-0x0000000001930000-0x0000000001C7A000-memory.dmp

    Filesize

    3.3MB

  • memory/1084-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3612-4-0x0000000074C70000-0x0000000075420000-memory.dmp

    Filesize

    7.7MB

  • memory/3612-0-0x0000000074C7E000-0x0000000074C7F000-memory.dmp

    Filesize

    4KB

  • memory/3612-5-0x000000000AF10000-0x000000000AFA2000-memory.dmp

    Filesize

    584KB

  • memory/3612-6-0x0000000002F00000-0x0000000002F0A000-memory.dmp

    Filesize

    40KB

  • memory/3612-7-0x000000000B0F0000-0x000000000B146000-memory.dmp

    Filesize

    344KB

  • memory/3612-8-0x000000000B0A0000-0x000000000B0AA000-memory.dmp

    Filesize

    40KB

  • memory/3612-9-0x0000000074C7E000-0x0000000074C7F000-memory.dmp

    Filesize

    4KB

  • memory/3612-10-0x0000000074C70000-0x0000000075420000-memory.dmp

    Filesize

    7.7MB

  • memory/3612-11-0x0000000001600000-0x0000000001662000-memory.dmp

    Filesize

    392KB

  • memory/3612-3-0x000000000B4C0000-0x000000000BA64000-memory.dmp

    Filesize

    5.6MB

  • memory/3612-2-0x000000000AE70000-0x000000000AF0C000-memory.dmp

    Filesize

    624KB

  • memory/3612-19-0x0000000074C70000-0x0000000075420000-memory.dmp

    Filesize

    7.7MB

  • memory/3612-1-0x0000000000B20000-0x0000000000C24000-memory.dmp

    Filesize

    1.0MB