Analysis

  • max time kernel
    50s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2024, 18:34

General

  • Target

    2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe

  • Size

    767KB

  • MD5

    2383a9414d20685ba100b1c103be00f6

  • SHA1

    c7ae8d14ac7d0d69d10b5aa2fbbd7373acc86af8

  • SHA256

    ae9e00afc3d70c56b36c68c8499b8fad834ef0382375a1814218985ecd9f8bda

  • SHA512

    8d6ff916b638e086ab4f47ca817c35a7b8eaebfdb1838d79c132f14daa8c33c1d98adbe867902a625582325dd8e061a6b61d45075c5fc7415194de1a524bc82b

  • SSDEEP

    12288:7df72iNeHK7zakGeVKwft+PtEZ2T5eWYrw+SbIkBpQc6stPRHKpbL8h:7dj1bDkEoTgq+YQc6Q5qpq

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

owt8

Decoy

globalstainlesssteel.com

bentleymichaels.com

svproductiveparents.com

vikinger.one

kiarabrunett.com

lakelandchiefs.com

kickzcity.com

ceroestrespma.com

torchfarmer.com

angelie26.com

pekinggardenonlineorder.com

brooklynrealtynow.com

makaroniwino.com

wiresncircuits.com

vwealth-archive.com

anfang1718.com

sahaconcierge.com

rctuition.com

premiercovidscreening.com

ryl3inc.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2876
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HFXKjdTRGl.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1608
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HFXKjdTRGl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8DED.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2600
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HFXKjdTRGl.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2604
    • C:\Users\Admin\AppData\Local\Temp\2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2383a9414d20685ba100b1c103be00f6_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp8DED.tmp

    Filesize

    1KB

    MD5

    eeea6d124f5d8be40ed99592205e438d

    SHA1

    625d60b340ff22862ec12c305285a4d213d9070f

    SHA256

    e769d23b82bc1fdaf5ac024de071bad920d9c97a83bd8ebe3fd4316cbe17c9ff

    SHA512

    17b18b005985cb38d2eb16640c7c80472f5f14de22ba47ee839b1f4641dbdcbfd09296b71942eb3b24dd3bd24368b2976e92385a82f7e27fe99fa35d23d8c6ee

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    1fa04e2c8183d39032a452c3e0cb63d8

    SHA1

    0ef7830d920d2889470429e63a41a9266046dfaa

    SHA256

    c52eee5af5395646296157613d613d5ba763d96d0d3bb79290b59531ae6edf3a

    SHA512

    62d5076ea4b5d8f7eb537e9686b526f4747a050965fa84e6384433a271fd1462c6375c6f0fa28b0f39fa207d908c7fe2154eacbfcb524ed6c04dd99b8577712e

  • memory/1692-24-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1692-25-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1692-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1692-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1720-3-0x0000000001E80000-0x0000000001E96000-memory.dmp

    Filesize

    88KB

  • memory/1720-7-0x0000000002090000-0x00000000020C4000-memory.dmp

    Filesize

    208KB

  • memory/1720-6-0x0000000005A60000-0x0000000005B04000-memory.dmp

    Filesize

    656KB

  • memory/1720-5-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB

  • memory/1720-4-0x000000007473E000-0x000000007473F000-memory.dmp

    Filesize

    4KB

  • memory/1720-0-0x000000007473E000-0x000000007473F000-memory.dmp

    Filesize

    4KB

  • memory/1720-2-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB

  • memory/1720-1-0x0000000000060000-0x0000000000126000-memory.dmp

    Filesize

    792KB

  • memory/1720-31-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB