Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 08:20

General

  • Target

    d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe

  • Size

    365KB

  • MD5

    d5f142b409d4ee2db56859ac3ecdad66

  • SHA1

    3048d6d0fae713f04145e190c2e24047efaaef7e

  • SHA256

    4883acd78928ccbab14d46de6f5be7ed91f0d6be16ad83b5214dfbbb218865bf

  • SHA512

    dac8b3c4a3d19753ef1cff5c17e4c1470897175cac0854c922c406acbb589192ab9614d0e965344789b1644ec62971e0664fc7466926d5788750063f242a4e6b

  • SSDEEP

    6144:Q9x8PY/bqy9n2wRfvtkOthbRiPwEMJ4ynpMiO6h1Kkbb9pIPKaaMqXFU2XihU:Q9x8PuhRFRdDhtuW4ybL1xbRKPtHT

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

l9

Decoy

vegobro.com

smartcoffeetoday.com

30ans2chats.com

montidauniospitali.com

quarterlifestyleblog.com

euronlinesolutions.com

compositedoors2you.com

swiftdws.com

fivestarenergyspecialist.com

wwwyh6622.com

outdoor-grill.site

fireequipmentatlanta.com

8640pe.com

kzwzx.loan

thincore.net

smsdshop.com

qzchangxinsb.com

jswztc.net

qjqlfhu.com

noza-consulting.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2816-0-0x0000000074A92000-0x0000000074A93000-memory.dmp

    Filesize

    4KB

  • memory/2816-1-0x0000000074A90000-0x0000000075041000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-2-0x0000000074A90000-0x0000000075041000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-3-0x0000000074A92000-0x0000000074A93000-memory.dmp

    Filesize

    4KB

  • memory/2816-4-0x0000000074A90000-0x0000000075041000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-7-0x0000000074A90000-0x0000000075041000-memory.dmp

    Filesize

    5.7MB

  • memory/3400-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3400-8-0x0000000001660000-0x00000000019AA000-memory.dmp

    Filesize

    3.3MB