Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 00:15

General

  • Target

    eeb694061828a85d96dad172e2c0d769_JaffaCakes118.exe

  • Size

    800KB

  • MD5

    eeb694061828a85d96dad172e2c0d769

  • SHA1

    86cd45c03f37da755031827664db75008871d531

  • SHA256

    86449943dfbb8187f96e59372009d7f31981becb12e676f86122945d72ac1d58

  • SHA512

    09921461c533592abfc2f9a07831b106a17bdf34840a5f9eb5d2ab5bf44e50112c04c0e304d9b1838dd5531b579584d0ac43c158db3d48667f42a546d772ccdd

  • SSDEEP

    12288:rxkgb+yDaWrRhRXtbaJC82qrVHF/ZzO3qbkbBIM5l9tWL/PGLkB:rDDhrRhRXtbrq14PbBIMf9tC2Lk

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

hx200

Decoy

noithatmyanh.com

agrimarineholdings.com

flapbrushes.com

wealthdragons.media

009ee.com

beautyindustrybadass.com

dg-ea.com

chewblaserwedding.com

shadesofaquarius.com

kitnekaa.net

0m2fourlook.men

xequangninh.com

respirosciamanico.com

china8315.com

jwvkur.com

fv520.com

xdrinkx.com

zxcvxcv.com

zheyongtools.com

123eela.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Users\Admin\AppData\Local\Temp\eeb694061828a85d96dad172e2c0d769_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\eeb694061828a85d96dad172e2c0d769_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Windows\SysWOW64\cmd.exe
        "cmd"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:408
        • C:\Users\Admin\Desktop\scOOKScliesnttex.exe
          "C:\Users\Admin\Desktop\scOOKScliesnttex.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1740
          • C:\Windows\SysWOW64\cmd.exe
            "cmd"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3304
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "scOOKScliesnttex" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\scOOKScliesnttex.txt" | cmd"
              6⤵
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              PID:3476
          • C:\Users\Admin\Desktop\scOOKScliesnttex.exe
            "C:\Users\Admin\Desktop\scOOKScliesnttex.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3552
            • C:\Windows\SysWOW64\cmd.exe
              "cmd"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3488
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "chachanoteeebila" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\chachanoteeebila.txt" | cmd"
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:800
            • C:\Users\Admin\Desktop\scOOKScliesnttex.exe
              "C:\Users\Admin\Desktop\scOOKScliesnttex.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2900
              • C:\Windows\SysWOW64\cmd.exe
                "cmd"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2780
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "chakhbakhworddse" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\chakhbakhworddse.txt" | cmd"
                  8⤵
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  PID:4084
              • C:\Users\Admin\Desktop\scOOKScliesnttex.exe
                "C:\Users\Admin\Desktop\scOOKScliesnttex.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                PID:1612
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3532
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\Desktop\scOOKScliesnttex.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\scOOKScliesnttex.exe.log

    Filesize

    223B

    MD5

    cde6529abeea500fb852f29ba0da6115

    SHA1

    45f2f48492417ae6a0eade8aaa808d3d1d760743

    SHA256

    d7f4964443470b6729865676d76f5f1f416da633033071c34ea5eb19cdea53b5

    SHA512

    c95fa7faf6a90f32060dba70f79c4d66c68d6eec587306fb98f36fc3ba5d377ebf9dabf47298b71db208fb10f7ccb4e0ed82236c8f26bcc746552588bbb38234

  • C:\Users\Admin\Desktop\scOOKScliesnttex.exe

    Filesize

    800KB

    MD5

    eeb694061828a85d96dad172e2c0d769

    SHA1

    86cd45c03f37da755031827664db75008871d531

    SHA256

    86449943dfbb8187f96e59372009d7f31981becb12e676f86122945d72ac1d58

    SHA512

    09921461c533592abfc2f9a07831b106a17bdf34840a5f9eb5d2ab5bf44e50112c04c0e304d9b1838dd5531b579584d0ac43c158db3d48667f42a546d772ccdd

  • memory/1612-29-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1612-26-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1740-8-0x0000000074EC0000-0x0000000075471000-memory.dmp

    Filesize

    5.7MB

  • memory/1740-10-0x0000000074EC0000-0x0000000075471000-memory.dmp

    Filesize

    5.7MB

  • memory/1740-11-0x0000000074EC0000-0x0000000075471000-memory.dmp

    Filesize

    5.7MB

  • memory/1740-17-0x0000000074EC0000-0x0000000075471000-memory.dmp

    Filesize

    5.7MB

  • memory/2900-21-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/3360-35-0x0000000007CA0000-0x0000000007D94000-memory.dmp

    Filesize

    976KB

  • memory/3532-31-0x0000000001740000-0x000000000175E000-memory.dmp

    Filesize

    120KB

  • memory/3532-30-0x0000000001740000-0x000000000175E000-memory.dmp

    Filesize

    120KB

  • memory/3552-19-0x0000000074EC0000-0x0000000075471000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-13-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3552-18-0x0000000074EC0000-0x0000000075471000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-24-0x0000000074EC0000-0x0000000075471000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-16-0x0000000074EC0000-0x0000000075471000-memory.dmp

    Filesize

    5.7MB

  • memory/4796-0-0x0000000074EC2000-0x0000000074EC3000-memory.dmp

    Filesize

    4KB

  • memory/4796-9-0x0000000074EC0000-0x0000000075471000-memory.dmp

    Filesize

    5.7MB

  • memory/4796-2-0x0000000074EC0000-0x0000000075471000-memory.dmp

    Filesize

    5.7MB

  • memory/4796-1-0x0000000074EC0000-0x0000000075471000-memory.dmp

    Filesize

    5.7MB