Analysis

  • max time kernel
    90s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2024 09:46

General

  • Target

    f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe

  • Size

    964KB

  • MD5

    f817bc5a13f0f7ffe8652f86dc0ce55f

  • SHA1

    0f2d30796f411da74a3af083966bad88f4a3a326

  • SHA256

    6d4e4528a1cb3af656e84e74dab6731c2d80f2e57f95ca865ba3a0628207a673

  • SHA512

    5d09e4adcdf7a2a73972433b89021e702e08882ada4a536fbdb92c8fa492193822fcd8655003a2dfdf38840ebdba065b9f12cb6a3df5deab5ca2dc6c9fa533c2

  • SSDEEP

    12288:q+6L7SIHNcIPaYJPaSiMae7TT4JwH/CW4yaWJSt:qZXbtc8aYJySiiPkSfC+f

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kbc

Decoy

ross76.com

modabyboutique.com

zenabode.store

peakorgmush.net

superchargelab.com

mumaniu.net

18costleyst.com

moreroomy.com

creativecardsnappanee.com

jameshamiltonphoto.com

amimania.com

ahaihealing.com

thecopy.coach

caishen2587.com

bigdickquick.com

suojincn.com

2020rl.com

jointbah.com

teddingtonstudios.com

javre.club

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CcbnPmJmAZnQJq" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCF90.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:3024
    • C:\Users\Admin\AppData\Local\Temp\f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f817bc5a13f0f7ffe8652f86dc0ce55f_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpCF90.tmp

    Filesize

    1KB

    MD5

    3b0de825be75211705293ce9fe380732

    SHA1

    f477ba4b4be99cba2747472213419530d505d8be

    SHA256

    f906cd8925fcae6b6f5124339667b04c0d87b4a1a6cef8877eae54dff352f14d

    SHA512

    6a9c1c3e1cfb63bc4eabb0e9b7cd17086d26ba171ac7ae1c4c247ec013520a14a3d1923c77046f638bcb40fe4270b8ab0bee88bf0c05696b035c1740cf9a0682

  • memory/3260-4-0x0000000005540000-0x00000000055D2000-memory.dmp

    Filesize

    584KB

  • memory/3260-9-0x000000007500E000-0x000000007500F000-memory.dmp

    Filesize

    4KB

  • memory/3260-3-0x0000000005A50000-0x0000000005FF4000-memory.dmp

    Filesize

    5.6MB

  • memory/3260-0-0x000000007500E000-0x000000007500F000-memory.dmp

    Filesize

    4KB

  • memory/3260-5-0x00000000054C0000-0x00000000054CA000-memory.dmp

    Filesize

    40KB

  • memory/3260-6-0x0000000005720000-0x0000000005776000-memory.dmp

    Filesize

    344KB

  • memory/3260-2-0x0000000005400000-0x000000000549C000-memory.dmp

    Filesize

    624KB

  • memory/3260-8-0x00000000057F0000-0x00000000057FA000-memory.dmp

    Filesize

    40KB

  • memory/3260-7-0x0000000075000000-0x00000000757B0000-memory.dmp

    Filesize

    7.7MB

  • memory/3260-10-0x0000000075000000-0x00000000757B0000-memory.dmp

    Filesize

    7.7MB

  • memory/3260-11-0x00000000059A0000-0x0000000005A02000-memory.dmp

    Filesize

    392KB

  • memory/3260-1-0x0000000000AA0000-0x0000000000B98000-memory.dmp

    Filesize

    992KB

  • memory/3260-19-0x0000000075000000-0x00000000757B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4972-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4972-20-0x00000000010A0000-0x00000000013EA000-memory.dmp

    Filesize

    3.3MB