Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 17:38

General

  • Target

    e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps1

  • Size

    420KB

  • MD5

    e3095c7f50ad6559e8aa569390c1fa94

  • SHA1

    e79ac8e78b26dee69a424325932e33cbe41c779e

  • SHA256

    30fbbb57213f860b61302762e7a6febcd16b1ce982c57be120fc92436f40eda2

  • SHA512

    fcde747c26d38e196647ce2f74649459ea2c911e1fa1d9c164b5b941bf683cb90b1b9a68d9611db355fa79cc5d3b130e235dc17033271177a775d1f8d4600362

  • SSDEEP

    12288:JZUvtaGX86HF/vpF8MdvXV2fm9r3EAVF57ZV13:Jlidl/vAcAe13EAZZ/3

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

pm

Decoy

pinkdolphingame.com

littlecarprice.com

zhangjinkai.com

daveycoin.com

brcomatualizacaobb.com

greenworldarg.com

constructorarabguar.com

0pe140.com

onevanillavariety.com

thedispensaryuk.com

missmomth.com

thealpha.biz

jjapanese.com

infinihybrid.com

bydcosmetics.com

jvboisoj.win

smartarchiving.com

kremesomorfias.com

akku2life.com

llbag.win

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Formbook payload 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 57 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3432
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps1
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Users\Public\idw.exe
        "C:\Users\Public\idw.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:5036
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:6440
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:6996
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\cmd.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:8168
      • C:\Windows\SysWOW64\cmd.exe
        /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
        3⤵
        • System Location Discovery: System Language Discovery
        PID:7548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DB1

    Filesize

    40KB

    MD5

    a182561a527f929489bf4b8f74f65cd7

    SHA1

    8cd6866594759711ea1836e86a5b7ca64ee8911f

    SHA256

    42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

    SHA512

    9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

  • C:\Users\Admin\AppData\Local\Temp\System.dll

    Filesize

    12KB

    MD5

    0d7ad4f45dc6f5aa87f606d0331c6901

    SHA1

    48df0911f0484cbe2a8cdd5362140b63c41ee457

    SHA256

    3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    SHA512

    c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3xrvajfi.vev.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\checkouts.dll

    Filesize

    10KB

    MD5

    926e963b53e59a9bb30483c470f52d3a

    SHA1

    51bd24b9f5a6cc15cfa29d9e39c088fb370e7f6a

    SHA256

    95295695b542e26c667f6c37958439448a8ba311e63d3cf9fb07e428dc77560f

    SHA512

    43d3176f0c1fc90362fa964077eee3c4510d940cb1aaa30720ec0186d2247cb8824d4a73134026d3bf2427a02a4562eccdd9f2db074fe6723e18995f4393f9e2

  • C:\Users\Admin\AppData\Roaming\3237pPEE\323logim.jpeg

    Filesize

    81KB

    MD5

    0bd098a2745c912ca32e37827c10c885

    SHA1

    64fea9b617f982a8d66477d577efd36828e0cede

    SHA256

    be9b6a01180bb1e5d347542300aad36162ed589bc44674791edfd29bd4a73a2a

    SHA512

    5bb9a2e70849f9342285ae9a137209ccdabb4fe4ece10b2b539b33876fafc53e7e1a218e5238ad26fec31d770051de8062074fa905b4316093385e8ef9052acf

  • C:\Users\Admin\AppData\Roaming\3237pPEE\323logrg.ini

    Filesize

    38B

    MD5

    4aadf49fed30e4c9b3fe4a3dd6445ebe

    SHA1

    1e332822167c6f351b99615eada2c30a538ff037

    SHA256

    75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

    SHA512

    eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

  • C:\Users\Admin\AppData\Roaming\3237pPEE\323logri.ini

    Filesize

    40B

    MD5

    d63a82e5d81e02e399090af26db0b9cb

    SHA1

    91d0014c8f54743bba141fd60c9d963f869d76c9

    SHA256

    eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

    SHA512

    38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

  • C:\Users\Admin\AppData\Roaming\3237pPEE\323logrv.ini

    Filesize

    872B

    MD5

    bbc41c78bae6c71e63cb544a6a284d94

    SHA1

    33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

    SHA256

    ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

    SHA512

    0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

  • C:\Users\Public\idw.exe

    Filesize

    299KB

    MD5

    2a561db2bbc97c16b70d2bba0b7519ce

    SHA1

    34f116f1fe59fba53d3a1974b4cb8d2abe525cbf

    SHA256

    6bb2dcc633b72774e13fa0f0fbc938eebf4726e46d4eb7676d8ee3990878ffb6

    SHA512

    b93677c5e2960c1e801cdb269fbf4f6ea3b3f1801c969b096c7372ddd23a65b97dcf5628af1f99c2912d71cb13f0038fc827fb523f2a075e0c1d4669bc1c7142

  • C:\Windows\win.ini

    Filesize

    131B

    MD5

    9848e4efb0abd437d65e6d3d1d973adb

    SHA1

    f427ac7c50b19f66658ae7f92cbaf21110b49a47

    SHA256

    c8b84add37da849977a84fe62badb6cb908be99769edb70d60bcd04c0aec2a3f

    SHA512

    f90f1f65b6b824a526469b8d739f733a54a7f485d8b5f680de7a35fac90786bf6ba5a0b1d62e139663c5ee73b8d687cf32d4ccf188e18c53084ec12d8c216b17

  • memory/1896-18-0x00007FFA7AB30000-0x00007FFA7B5F1000-memory.dmp

    Filesize

    10.8MB

  • memory/1896-6-0x0000018677D40000-0x0000018677D62000-memory.dmp

    Filesize

    136KB

  • memory/1896-11-0x00007FFA7AB30000-0x00007FFA7B5F1000-memory.dmp

    Filesize

    10.8MB

  • memory/1896-12-0x00007FFA7AB30000-0x00007FFA7B5F1000-memory.dmp

    Filesize

    10.8MB

  • memory/1896-0-0x00007FFA7AB33000-0x00007FFA7AB35000-memory.dmp

    Filesize

    8KB

  • memory/3432-10057-0x00000000088E0000-0x0000000008A11000-memory.dmp

    Filesize

    1.2MB

  • memory/5036-40-0x0000000002440000-0x000000000244A000-memory.dmp

    Filesize

    40KB

  • memory/5036-47-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/5036-10049-0x0000000002460000-0x0000000002480000-memory.dmp

    Filesize

    128KB

  • memory/5036-46-0x0000000002410000-0x0000000002411000-memory.dmp

    Filesize

    4KB

  • memory/6440-10050-0x00000000009B0000-0x00000000009B6000-memory.dmp

    Filesize

    24KB

  • memory/6440-10053-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/6440-10054-0x00000000009B0000-0x00000000009B6000-memory.dmp

    Filesize

    24KB

  • memory/6440-10051-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/6996-10055-0x00000000000C0000-0x00000000000CC000-memory.dmp

    Filesize

    48KB