Analysis

  • max time kernel
    135s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2024 22:35

General

  • Target

    1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe

  • Size

    659KB

  • MD5

    1529e24878b76569a00a6ace946b26c3

  • SHA1

    4b34d00d51163df2fd910af7f8090d4395e02d2b

  • SHA256

    e16d387101d1434664447f49429575cc204e9314c911b6e6f0bbbd61ed15de0d

  • SHA512

    14d8bbd0efe8e06367dca4bd834444ad25472c42c4dc3fb6cacc7a721d94414f5738844e39edc2305c944f0f559bc1d653a6999d187171c563cbc46a3006d54e

  • SSDEEP

    6144:EfI6LkHEjyKPPPPPPPZWSMPoCpI4n8ZCw0I4n8ZCwxWGGM2LfDrja6GS0rOGecru:CMkudPoCIVZYIVZ52DDrj5J0bJe1

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

hx230

Decoy

survivalrule.com

xnthtdme.com

toddwhitefilm.com

agmates.com

dayspaqueenstown.com

anuariosdigitales.com

nationalscenictrails.com

novamoda.store

ronaldasimpson.com

congressogerontologia.com

hotelsirius.biz

lingotown.net

kingporn.accountant

oceano.cloud

intimoecasabiancheria.com

meindikai.com

vanillapdf.com

sngyyw.accountant

chapelhillsurvey.com

www719678.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\1529e24878b76569a00a6ace946b26c3_JaffaCakes118.exe"
      2⤵
        PID:1296
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 184
          3⤵
          • Program crash
          PID:372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1296 -ip 1296
      1⤵
        PID:1560

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1296-18-0x0000000000390000-0x00000000003BA000-memory.dmp

        Filesize

        168KB

      • memory/4448-7-0x00000000745A0000-0x0000000074D50000-memory.dmp

        Filesize

        7.7MB

      • memory/4448-3-0x00000000078E0000-0x0000000007972000-memory.dmp

        Filesize

        584KB

      • memory/4448-2-0x0000000007D80000-0x0000000008324000-memory.dmp

        Filesize

        5.6MB

      • memory/4448-4-0x0000000007860000-0x000000000787A000-memory.dmp

        Filesize

        104KB

      • memory/4448-5-0x00000000745A0000-0x0000000074D50000-memory.dmp

        Filesize

        7.7MB

      • memory/4448-0-0x00000000745AE000-0x00000000745AF000-memory.dmp

        Filesize

        4KB

      • memory/4448-9-0x00000000745A0000-0x0000000074D50000-memory.dmp

        Filesize

        7.7MB

      • memory/4448-10-0x0000000008BE0000-0x0000000008C7C000-memory.dmp

        Filesize

        624KB

      • memory/4448-11-0x00000000745AE000-0x00000000745AF000-memory.dmp

        Filesize

        4KB

      • memory/4448-13-0x00000000745A0000-0x0000000074D50000-memory.dmp

        Filesize

        7.7MB

      • memory/4448-1-0x0000000000950000-0x00000000009FE000-memory.dmp

        Filesize

        696KB

      • memory/4448-19-0x00000000745A0000-0x0000000074D50000-memory.dmp

        Filesize

        7.7MB