Analysis

  • max time kernel
    145s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 17:19

General

  • Target

    d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe

  • Size

    835KB

  • MD5

    d4e0768ec86d2f8d8b6a6b725bda4b87

  • SHA1

    4bd5d2c5c06e38cd70a18e4a99c16e0f1f841dee

  • SHA256

    09c8bb08807219149a78bfa1e239f5022e6eb2e802f87dffe87d0bcf16e483a8

  • SHA512

    f135e550defa90c4fc7d750628aae850405107998f6af9ebcb89b42ba26d3c977f37caff7c694db5617ada189872332dcc5175dd10d1c08e64cad7e3146a0f9e

  • SSDEEP

    24576:7iszFFV90kSaUdGAMVb32G6TVjuDsJ8BDeL+cLaA43DBDErHueXsS:1T

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ph

Decoy

spiderwebz.com

princeworld2.com

elbirligiguclukadin.com

cy1032.com

tourpetour.com

oneintegraventures.com

fmhihlb.com

cslounge.net

prnqf.info

mensa-edu.com

wfc288.com

built-design.co.uk

apnei.com

divachain.com

yuntopon.com

tobaccovision.win

ecogef80.com

onot.ltd

rushhut.com

g6006.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2292
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2140
          • C:\Windows\SysWOW64\wscript.exe
            "C:\Windows\SysWOW64\wscript.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:1880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1216-73-0x0000000004A00000-0x0000000004AF2000-memory.dmp

      Filesize

      968KB

    • memory/1216-78-0x0000000004A00000-0x0000000004AF2000-memory.dmp

      Filesize

      968KB

    • memory/1216-74-0x0000000004F00000-0x0000000005001000-memory.dmp

      Filesize

      1.0MB

    • memory/1216-69-0x0000000004F00000-0x0000000005001000-memory.dmp

      Filesize

      1.0MB

    • memory/2140-71-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2140-72-0x0000000000380000-0x0000000000394000-memory.dmp

      Filesize

      80KB

    • memory/2140-63-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2140-67-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2140-68-0x0000000000140000-0x0000000000154000-memory.dmp

      Filesize

      80KB

    • memory/2140-65-0x0000000000920000-0x0000000000C23000-memory.dmp

      Filesize

      3.0MB

    • memory/2140-60-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2140-61-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2140-62-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2292-50-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-10-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-44-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-42-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-40-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-38-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-36-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-34-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-32-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-30-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-28-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-26-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-24-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-22-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-20-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-18-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-16-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-14-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-12-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-46-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-8-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-48-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-0-0x0000000074E0E000-0x0000000074E0F000-memory.dmp

      Filesize

      4KB

    • memory/2292-52-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-54-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-64-0x0000000074E00000-0x00000000754EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2292-56-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-58-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-59-0x0000000074E00000-0x00000000754EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2292-6-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-5-0x00000000002E0000-0x00000000002FF000-memory.dmp

      Filesize

      124KB

    • memory/2292-4-0x0000000074E00000-0x00000000754EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2292-3-0x00000000002E0000-0x0000000000306000-memory.dmp

      Filesize

      152KB

    • memory/2292-2-0x0000000000840000-0x0000000000894000-memory.dmp

      Filesize

      336KB

    • memory/2292-1-0x00000000000B0000-0x0000000000188000-memory.dmp

      Filesize

      864KB

    • memory/2652-77-0x0000000000AD0000-0x0000000000AF6000-memory.dmp

      Filesize

      152KB

    • memory/2652-75-0x0000000000AD0000-0x0000000000AF6000-memory.dmp

      Filesize

      152KB