Analysis

  • max time kernel
    90s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 16:17

General

  • Target

    dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    dabd977757d5a8f9f6c4d0eec59aa8b4

  • SHA1

    871b0d771cae8940cf701393b73c09af95d28dc1

  • SHA256

    1bfc762ad3b4af3779cdc51c124f8e027e9cb5ea7e2a91d2a0fe65feeb6d009b

  • SHA512

    fbec5b7307947f8787110f938c021d7b01403089ce772c36b206fe358a469070986680ea6f9880a188c98561bbf41dd4d2678570a16d4749962dd2445487fc13

  • SSDEEP

    24576:Xu6J33O0c+JY5UZ+XC0kGso6FaonTouYYB8JTN7PnTNVZ/Vdsq+RLfGMOwtWY:xu0c++OCvkGs9FadNVZIRLfelY

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

m2

Decoy

huiminglu.com

cysine.net

kaleideski.com

southwestdatingtour.com

boniyou.com

etherealvidas.com

blockbookblock.net

edgeerp.net

fixcellnow.com

wrow.ltd

dryceclothing.com

3866636.com

quotesvault.com

eaglesummitfootankle.info

bakehr.net

xpandarts.com

adflybot.info

tarcofinance.net

physicoal.com

109ch.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"
      2⤵
        PID:4880
      • C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"
        2⤵
          PID:2432
        • C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"
          2⤵
            PID:1464
          • C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"
            2⤵
              PID:4684
            • C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\dabd977757d5a8f9f6c4d0eec59aa8b4_JaffaCakes118.exe"
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1316

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1316-1-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/1316-4-0x00000000019A0000-0x0000000001CEA000-memory.dmp

            Filesize

            3.3MB

          • memory/3956-0-0x0000000002610000-0x0000000002611000-memory.dmp

            Filesize

            4KB