Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 22:35

General

  • Target

    1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe

  • Size

    659KB

  • MD5

    1529e24878b76569a00a6ace946b26c3

  • SHA1

    4b34d00d51163df2fd910af7f8090d4395e02d2b

  • SHA256

    e16d387101d1434664447f49429575cc204e9314c911b6e6f0bbbd61ed15de0d

  • SHA512

    14d8bbd0efe8e06367dca4bd834444ad25472c42c4dc3fb6cacc7a721d94414f5738844e39edc2305c944f0f559bc1d653a6999d187171c563cbc46a3006d54e

  • SSDEEP

    6144:EfI6LkHEjyKPPPPPPPZWSMPoCpI4n8ZCw0I4n8ZCwxWGGM2LfDrja6GS0rOGecru:CMkudPoCIVZYIVZ52DDrj5J0bJe1

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

hx230

Decoy

survivalrule.com

xnthtdme.com

toddwhitefilm.com

agmates.com

dayspaqueenstown.com

anuariosdigitales.com

nationalscenictrails.com

novamoda.store

ronaldasimpson.com

congressogerontologia.com

hotelsirius.biz

lingotown.net

kingporn.accountant

oceano.cloud

intimoecasabiancheria.com

meindikai.com

vanillapdf.com

sngyyw.accountant

chapelhillsurvey.com

www719678.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 36
        3⤵
        • Program crash
        PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2608-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2608-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2608-18-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2608-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2700-5-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-14-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-8-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-9-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-10-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-0-0x000000007481E000-0x000000007481F000-memory.dmp

    Filesize

    4KB

  • memory/2700-13-0x00000000006D0000-0x00000000007D0000-memory.dmp

    Filesize

    1024KB

  • memory/2700-6-0x000000007481E000-0x000000007481F000-memory.dmp

    Filesize

    4KB

  • memory/2700-3-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-16-0x00000000006D0000-0x00000000007D0000-memory.dmp

    Filesize

    1024KB

  • memory/2700-17-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2700-2-0x00000000004A0000-0x00000000004BA000-memory.dmp

    Filesize

    104KB

  • memory/2700-1-0x0000000000A80000-0x0000000000B2E000-memory.dmp

    Filesize

    696KB

  • memory/2700-21-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB