Analysis

  • max time kernel
    125s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 09:27

General

  • Target

    e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe

  • Size

    724KB

  • MD5

    e8cdc455c726afea65ab6a4b0b45d45c

  • SHA1

    fdd9d44b3aea76ad42f64cab1f433f8daae99e0e

  • SHA256

    f972763991a3043f1e9cca9c8b0d368d6ff9628bbb21fbe4d7213ffd75a67494

  • SHA512

    6009df138097dda48489c15647cf834406cd15331720b52ef0787af191b36b95d42ecb06731a29add61a6c78d9bdb376b2b3ba91ba7d91d8741d2abd665b48af

  • SSDEEP

    6144:wT0p9994cccccccmMI4LSMd1ZOOP9eT+R8a2sUrJLa5SvSWlTlOiIoJuZ2sWTjuQ:wwuMIyDzEOPUyCsR5SOAJhyJVLPQ

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

pe

Decoy

blackcatproud.com

kddgu.info

jhholiday.com

woshunwang.com

qrvou.info

yinuojie.com

404arabs.com

diaojieorg.com

hsyfjj.com

medusabotanicals.com

ghay5c.com

wm785.com

bikeandart.com

ygyroadside.info

whitewings.biz

4pointpartnersbv.com

tukangsedotwc.net

democrataward.com

systemtraffic2updating.win

thevlu.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3316
    • C:\Users\Admin\AppData\Local\Temp\e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\e8cdc455c726afea65ab6a4b0b45d45c_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4860
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4288,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:8
    1⤵
      PID:4680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3316-3-0x0000000077201000-0x0000000077321000-memory.dmp

      Filesize

      1.1MB

    • memory/4860-6-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB