Analysis

  • max time kernel
    93s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2024 21:49

General

  • Target

    19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe

  • Size

    877KB

  • MD5

    19e4c0e192b1966e105f7cdc815d4861

  • SHA1

    201261501086a6ca7511206ebf17232af50706b8

  • SHA256

    e2ab98687c215cc7f4e84d11bdcc6a83d797944132901cbbd6b1c23a47efba08

  • SHA512

    9bd0a604aa0df102503e7bf9b5b70c8b7740a365009e3755ed3eca4f8da85568ed6c1fe9810f734096c667705fc1c5d3c1fe4369d47912fd90c50aeb81b1a641

  • SSDEEP

    12288:YVqGUslKAn3qGaNHEyC9/oR9gy5FHK7zcRLL+UVdgYjksp/4e6xrZ9dh6tLxgvvl:YnKAPp9AR95yOLL1jkwg3xVl6tu1

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

chad

Decoy

osiribodhisattva.com

e-ticaretdostu.com

integrocapitalllc.com

pasarbb.com

curavy.com

efcomportamento.com

twittertornado.com

siyhy.com

roamnext.com

hongduen.com

urbaanmarket.com

davidcavanaghreplays.com

comperhouse.com

ne-nerede.net

m365fordevs.com

structuredadvocates.com

withalldads.love

assanamusic.info

oshaberi-machiko.com

mollyellen.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe"
      2⤵
        PID:4908
      • C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\19e4c0e192b1966e105f7cdc815d4861_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2752-13-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2752-16-0x0000000001350000-0x000000000169A000-memory.dmp

      Filesize

      3.3MB

    • memory/4180-8-0x00000000078E0000-0x00000000078F6000-memory.dmp

      Filesize

      88KB

    • memory/4180-9-0x000000007516E000-0x000000007516F000-memory.dmp

      Filesize

      4KB

    • memory/4180-4-0x0000000004D40000-0x0000000004DD2000-memory.dmp

      Filesize

      584KB

    • memory/4180-6-0x0000000075160000-0x0000000075910000-memory.dmp

      Filesize

      7.7MB

    • memory/4180-5-0x0000000004C50000-0x0000000004C5A000-memory.dmp

      Filesize

      40KB

    • memory/4180-7-0x0000000004ED0000-0x0000000004F26000-memory.dmp

      Filesize

      344KB

    • memory/4180-0-0x000000007516E000-0x000000007516F000-memory.dmp

      Filesize

      4KB

    • memory/4180-3-0x0000000005250000-0x00000000057F4000-memory.dmp

      Filesize

      5.6MB

    • memory/4180-10-0x0000000075160000-0x0000000075910000-memory.dmp

      Filesize

      7.7MB

    • memory/4180-11-0x0000000007E70000-0x0000000007F0E000-memory.dmp

      Filesize

      632KB

    • memory/4180-12-0x000000000A620000-0x000000000A654000-memory.dmp

      Filesize

      208KB

    • memory/4180-2-0x0000000004B60000-0x0000000004BFC000-memory.dmp

      Filesize

      624KB

    • memory/4180-15-0x0000000075160000-0x0000000075910000-memory.dmp

      Filesize

      7.7MB

    • memory/4180-1-0x0000000000120000-0x0000000000200000-memory.dmp

      Filesize

      896KB