Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-09-2024 03:38

General

  • Target

    e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe

  • Size

    268KB

  • MD5

    e5fb31f7be04068fc088418d642e292b

  • SHA1

    9c043826be0f12c96dce9a58b6793dfe33926589

  • SHA256

    42154d0805933548da9b7a9fbbce40be9e155091e6f96ed4ce324c21b3430b20

  • SHA512

    717dd2e37ca44041293dfda5bd6a455c83d33d62e55a0d34bfdbe90deddf12e65dafff3819de3a38e59d241cd2aca2f7ecbfe366935b6fff0a21846176ae9299

  • SSDEEP

    6144:AyaOH6GdiNywts0oFiv4HmdChI7Cm6Vad:+f3i44GdyIH

Malware Config

Extracted

Family

formbook

Version

3.7

Campaign

ch27

Decoy

lijianfans.net

keziamandelin.com

goldenoceanoutdoor.com

isilvaphotography.com

cindypantoja.com

animalfriendsllc.com

diikey.com

trainerpoqe.men

berastours.com

pagelink.info

lemsinternetbiz.site

cervezascolder.com

bombom.site

heromorfin.com

eltirachinasasturiano.com

spacity.biz

microbladingshop.net

tfworkstation.com

mengxiaoxi.net

ggg585.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\AppData\Local\Temp\e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\e5fb31f7be04068fc088418d642e292b_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2344-3-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4488-2-0x0000000077381000-0x00000000774A1000-memory.dmp

    Filesize

    1.1MB

  • memory/4488-4-0x0000000077381000-0x00000000774A1000-memory.dmp

    Filesize

    1.1MB