Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 16:17

General

  • Target

    dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    dabd977757d5a8f9f6c4d0eec59aa8b4

  • SHA1

    871b0d771cae8940cf701393b73c09af95d28dc1

  • SHA256

    1bfc762ad3b4af3779cdc51c124f8e027e9cb5ea7e2a91d2a0fe65feeb6d009b

  • SHA512

    fbec5b7307947f8787110f938c021d7b01403089ce772c36b206fe358a469070986680ea6f9880a188c98561bbf41dd4d2678570a16d4749962dd2445487fc13

  • SSDEEP

    24576:Xu6J33O0c+JY5UZ+XC0kGso6FaonTouYYB8JTN7PnTNVZ/Vdsq+RLfGMOwtWY:xu0c++OCvkGs9FadNVZIRLfelY

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

m2

Decoy

huiminglu.com

cysine.net

kaleideski.com

southwestdatingtour.com

boniyou.com

etherealvidas.com

blockbookblock.net

edgeerp.net

fixcellnow.com

wrow.ltd

dryceclothing.com

3866636.com

quotesvault.com

eaglesummitfootankle.info

bakehr.net

xpandarts.com

adflybot.info

tarcofinance.net

physicoal.com

109ch.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"
      2⤵
        PID:2624
      • C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"
        2⤵
          PID:2096
        • C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"
          2⤵
            PID:2772
          • C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2488

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/784-0-0x0000000000110000-0x0000000000111000-memory.dmp

          Filesize

          4KB

        • memory/2488-1-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2488-5-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2488-3-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2488-8-0x0000000000C90000-0x0000000000F93000-memory.dmp

          Filesize

          3.0MB