Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 01:41

General

  • Target

    e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe

  • Size

    513KB

  • MD5

    e174a81d3a5acbb08094c63102f38e76

  • SHA1

    a0c3be456bb4eeb5c76c7896df3ba511f0905fda

  • SHA256

    b676c82353948f50f7e978b317f1633903c5a03a99b659bcb0395109b05f6012

  • SHA512

    244df2d51138ba8832ec9109294d438cb986f46b10b94477443f8c723581c0f82d374d672234cc6f736a682304838b240d7ffcdb91124f1b7ac24a530b4570c3

  • SSDEEP

    12288:B1xd8PIcO+kOmZ2xd8PIcO+kOmZcIztkolugFnJ7:BdMk+kbUMk+kbcXobJ7

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

fr

Decoy

comptonbusinesschamber.com

roxanalabrador.com

orid.ltd

sbeaney.com

4petstuff.com

smartquality-preprod.com

vlach.site

salao-brasil.com

lindenrealty.net

redvinci.com

yellowdragster.com

fancygalaccessories.com

scalaweb.win

ditrabook.com

adler-willisau.com

dszongbu.com

mz-inc.info

mollymormons.com

financialbooster.info

nanmuxiehui.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 4 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3392
    • C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:548
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe:Zone.Identifier"
        3⤵
        • Subvert Trust Controls: Mark-of-the-Web Bypass
        • System Location Discovery: System Language Discovery
        • NTFS ADS
        PID:3224
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe:Zone.Identifier"
        3⤵
        • Subvert Trust Controls: Mark-of-the-Web Bypass
        • System Location Discovery: System Language Discovery
        • NTFS ADS
        PID:4548
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\logsx.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • NTFS ADS
        PID:4392
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\logsx.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Users\Admin\AppData\Local\logsx.exe
          "C:\Users\Admin\AppData\Local\logsx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4412
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\logsx.exe:Zone.Identifier"
            5⤵
            • Subvert Trust Controls: Mark-of-the-Web Bypass
            • System Location Discovery: System Language Discovery
            • NTFS ADS
            PID:3544
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\logsx.exe:Zone.Identifier"
            5⤵
            • Subvert Trust Controls: Mark-of-the-Web Bypass
            • System Location Discovery: System Language Discovery
            • NTFS ADS
            PID:2020
          • C:\Users\Admin\AppData\Local\logsx.exe
            "C:\Users\Admin\AppData\Local\logsx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:4344
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\SysWOW64\mstsc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\logsx.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\logsx.exe

    Filesize

    513KB

    MD5

    e174a81d3a5acbb08094c63102f38e76

    SHA1

    a0c3be456bb4eeb5c76c7896df3ba511f0905fda

    SHA256

    b676c82353948f50f7e978b317f1633903c5a03a99b659bcb0395109b05f6012

    SHA512

    244df2d51138ba8832ec9109294d438cb986f46b10b94477443f8c723581c0f82d374d672234cc6f736a682304838b240d7ffcdb91124f1b7ac24a530b4570c3

  • memory/548-12-0x0000000074690000-0x0000000074E40000-memory.dmp

    Filesize

    7.7MB

  • memory/548-10-0x0000000006630000-0x0000000006638000-memory.dmp

    Filesize

    32KB

  • memory/548-3-0x0000000005600000-0x0000000005692000-memory.dmp

    Filesize

    584KB

  • memory/548-4-0x000000007469E000-0x000000007469F000-memory.dmp

    Filesize

    4KB

  • memory/548-5-0x00000000059A0000-0x00000000059CA000-memory.dmp

    Filesize

    168KB

  • memory/548-6-0x00000000060C0000-0x0000000006126000-memory.dmp

    Filesize

    408KB

  • memory/548-7-0x0000000005A90000-0x0000000005AB2000-memory.dmp

    Filesize

    136KB

  • memory/548-8-0x0000000074690000-0x0000000074E40000-memory.dmp

    Filesize

    7.7MB

  • memory/548-9-0x0000000006810000-0x00000000069D2000-memory.dmp

    Filesize

    1.8MB

  • memory/548-1-0x0000000000B60000-0x0000000000BE6000-memory.dmp

    Filesize

    536KB

  • memory/548-11-0x0000000006620000-0x000000000662C000-memory.dmp

    Filesize

    48KB

  • memory/548-0-0x000000007469E000-0x000000007469F000-memory.dmp

    Filesize

    4KB

  • memory/548-2-0x0000000005B10000-0x00000000060B4000-memory.dmp

    Filesize

    5.6MB

  • memory/548-17-0x0000000074690000-0x0000000074E40000-memory.dmp

    Filesize

    7.7MB

  • memory/3392-36-0x0000000008EA0000-0x0000000009008000-memory.dmp

    Filesize

    1.4MB

  • memory/4212-33-0x00000000001B0000-0x00000000002EA000-memory.dmp

    Filesize

    1.2MB

  • memory/4212-32-0x00000000001B0000-0x00000000002EA000-memory.dmp

    Filesize

    1.2MB

  • memory/4344-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4412-30-0x0000000074690000-0x0000000074E40000-memory.dmp

    Filesize

    7.7MB

  • memory/4412-26-0x00000000060C0000-0x000000000615C000-memory.dmp

    Filesize

    624KB

  • memory/4412-25-0x0000000005A90000-0x0000000005A9C000-memory.dmp

    Filesize

    48KB

  • memory/4412-24-0x0000000074690000-0x0000000074E40000-memory.dmp

    Filesize

    7.7MB

  • memory/4412-23-0x0000000074690000-0x0000000074E40000-memory.dmp

    Filesize

    7.7MB

  • memory/4412-22-0x0000000074690000-0x0000000074E40000-memory.dmp

    Filesize

    7.7MB

  • memory/4412-21-0x0000000074690000-0x0000000074E40000-memory.dmp

    Filesize

    7.7MB