Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2024 21:49

General

  • Target

    19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe

  • Size

    877KB

  • MD5

    19e4c0e192b1966e105f7cdc815d4861

  • SHA1

    201261501086a6ca7511206ebf17232af50706b8

  • SHA256

    e2ab98687c215cc7f4e84d11bdcc6a83d797944132901cbbd6b1c23a47efba08

  • SHA512

    9bd0a604aa0df102503e7bf9b5b70c8b7740a365009e3755ed3eca4f8da85568ed6c1fe9810f734096c667705fc1c5d3c1fe4369d47912fd90c50aeb81b1a641

  • SSDEEP

    12288:YVqGUslKAn3qGaNHEyC9/oR9gy5FHK7zcRLL+UVdgYjksp/4e6xrZ9dh6tLxgvvl:YnKAPp9AR95yOLL1jkwg3xVl6tu1

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

chad

Decoy

osiribodhisattva.com

e-ticaretdostu.com

integrocapitalllc.com

pasarbb.com

curavy.com

efcomportamento.com

twittertornado.com

siyhy.com

roamnext.com

hongduen.com

urbaanmarket.com

davidcavanaghreplays.com

comperhouse.com

ne-nerede.net

m365fordevs.com

structuredadvocates.com

withalldads.love

assanamusic.info

oshaberi-machiko.com

mollyellen.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1648-6-0x0000000005D30000-0x0000000005DCE000-memory.dmp

    Filesize

    632KB

  • memory/1648-0-0x0000000074C3E000-0x0000000074C3F000-memory.dmp

    Filesize

    4KB

  • memory/1648-2-0x0000000074C30000-0x000000007531E000-memory.dmp

    Filesize

    6.9MB

  • memory/1648-3-0x0000000000230000-0x0000000000246000-memory.dmp

    Filesize

    88KB

  • memory/1648-4-0x0000000074C3E000-0x0000000074C3F000-memory.dmp

    Filesize

    4KB

  • memory/1648-5-0x0000000074C30000-0x000000007531E000-memory.dmp

    Filesize

    6.9MB

  • memory/1648-1-0x0000000000B10000-0x0000000000BF0000-memory.dmp

    Filesize

    896KB

  • memory/1648-7-0x0000000000560000-0x0000000000594000-memory.dmp

    Filesize

    208KB

  • memory/1648-15-0x0000000074C30000-0x000000007531E000-memory.dmp

    Filesize

    6.9MB

  • memory/2808-14-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2808-8-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2808-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2808-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2808-16-0x0000000000BF0000-0x0000000000EF3000-memory.dmp

    Filesize

    3.0MB