Analysis

  • max time kernel
    97s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 19:30

General

  • Target

    0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe

  • Size

    909KB

  • MD5

    0c2b1eeac25a832ce077154cf58b8ffd

  • SHA1

    b6c42b104518cd63b967edbffe1c25187fa7d9f3

  • SHA256

    f23a4109022b07435c73f2f5e29770e87cdda4ef2a77c8b978a2b089399ea903

  • SHA512

    93622b34856b3aaf16967fac2dd53f388ebf1de5096a8b30a5a19ba76ec7f907b72aa80d9f6eb498f6162cff1f8d5cb8f5f532c0d745af0f6f761ac350d7233a

  • SSDEEP

    12288:taWK2n3qGaNHEyC9/oR9gy5FHK7zj40FvGFrE4trCdBdWSQZ3+ybEwcjpg+OzRV6:tnKePp9AR95yX40F8rC1K1Fc9QVixIO

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

o4ms

Decoy

fishingboatpub.com

trebor72.com

qualitycleanaustralia.com

amphilykenyx.com

jayte90.net

alveegrace.com

le-fleursoleil.com

volumoffer.com

businessbookwriters.com

alpin-art.com

firsttastetogo.com

catofc.com

ref-290.com

sbo2008.com

fortlauderdaleelevators.com

shanghaiyalian.com

majestybags.com

afcerd.com

myceliated.com

ls0a.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KFwXXDtxJrwJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4F92.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4420
    • C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"
      2⤵
        PID:4312
      • C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\0c2b1eeac25a832ce077154cf58b8ffd_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3940

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp4F92.tmp

      Filesize

      1KB

      MD5

      d25647ade8c9df2985b5f071fa98fad0

      SHA1

      4db8b77becb24c1ff5485eb082fbe1541e54c307

      SHA256

      d98550dddfe85127fc1d9f5912b410b1073dc3b72e695ca6fb0ee23393f1c8ae

      SHA512

      22ae375944dc15d0f81bde81b30b7b71b046fe4ad26b5729b6bfee10704bc6fe39fd8a9b51ca353cdc49931fa904090cf9d4c8046952f78302e826154cfa1e1d

    • memory/3292-8-0x0000000008180000-0x0000000008196000-memory.dmp

      Filesize

      88KB

    • memory/3292-7-0x0000000074E70000-0x0000000075620000-memory.dmp

      Filesize

      7.7MB

    • memory/3292-3-0x0000000005A20000-0x0000000005FC4000-memory.dmp

      Filesize

      5.6MB

    • memory/3292-4-0x0000000005510000-0x00000000055A2000-memory.dmp

      Filesize

      584KB

    • memory/3292-9-0x0000000074E7E000-0x0000000074E7F000-memory.dmp

      Filesize

      4KB

    • memory/3292-6-0x0000000005740000-0x0000000005796000-memory.dmp

      Filesize

      344KB

    • memory/3292-2-0x00000000053D0000-0x000000000546C000-memory.dmp

      Filesize

      624KB

    • memory/3292-0-0x0000000074E7E000-0x0000000074E7F000-memory.dmp

      Filesize

      4KB

    • memory/3292-5-0x00000000054F0000-0x00000000054FA000-memory.dmp

      Filesize

      40KB

    • memory/3292-10-0x0000000074E70000-0x0000000075620000-memory.dmp

      Filesize

      7.7MB

    • memory/3292-11-0x0000000008620000-0x00000000086C4000-memory.dmp

      Filesize

      656KB

    • memory/3292-12-0x000000000ADD0000-0x000000000AE04000-memory.dmp

      Filesize

      208KB

    • memory/3292-1-0x00000000009B0000-0x0000000000A98000-memory.dmp

      Filesize

      928KB

    • memory/3292-20-0x0000000074E70000-0x0000000075620000-memory.dmp

      Filesize

      7.7MB

    • memory/3940-18-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3940-21-0x00000000019F0000-0x0000000001D3A000-memory.dmp

      Filesize

      3.3MB