Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 10:35

General

  • Target

    ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe

  • Size

    764KB

  • MD5

    ed67a014369cbf061b4464b77c3765c0

  • SHA1

    ee4eccd455b179d3b62aa5b813d6def9f40d0f67

  • SHA256

    85dc1d019667588686df02bc9e2ab3b40730bc826404669e0c2c70b27d679407

  • SHA512

    3d8e06276fd9eef01d50c756e8bdea6c5fd4220defc1e793c8c6078babaab630f676b0e7b06d7f32ef6cad24dd5667759dcdbb27dd62e7e861b6da39bc3e61d3

  • SSDEEP

    12288:AYIjfe/f3oHPabS8qV/z2cuDqZxZYYut:AY733oHyrq9z2G

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

pe

Decoy

blackcatproud.com

kddgu.info

jhholiday.com

woshunwang.com

qrvou.info

yinuojie.com

404arabs.com

diaojieorg.com

hsyfjj.com

medusabotanicals.com

ghay5c.com

wm785.com

bikeandart.com

ygyroadside.info

whitewings.biz

4pointpartnersbv.com

tukangsedotwc.net

democrataward.com

systemtraffic2updating.win

thevlu.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ed67a014369cbf061b4464b77c3765c0_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2116-3-0x0000000077021000-0x0000000077122000-memory.dmp

    Filesize

    1.0MB

  • memory/2116-6-0x0000000077020000-0x00000000771C9000-memory.dmp

    Filesize

    1.7MB

  • memory/2116-5-0x0000000000250000-0x0000000000350000-memory.dmp

    Filesize

    1024KB

  • memory/2756-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2756-7-0x0000000077020000-0x00000000771C9000-memory.dmp

    Filesize

    1.7MB