Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 07:07

General

  • Target

    5615be335807b5eb2d4c9f59f5f914dd_JaffaCakes118.exe

  • Size

    809KB

  • MD5

    5615be335807b5eb2d4c9f59f5f914dd

  • SHA1

    8c4dfb652aced72e0fa9630f8b0146ef9f80dc9b

  • SHA256

    d6b9ef1899c1b113371f34db9d306763e20d9dc759fb9975982a53e6a11b1f5b

  • SHA512

    0b759914251a21212f944e0d215fc7e8ac4c55c96b5b8520f26ab0a5d5111d6760c75bb510756ed2c4591fa7ab3a908ff5a299897e16d4dd461cc3969e1cacd2

  • SSDEEP

    12288:PEQoWX2y6qHcwTeGKJEq/y6INX6LRgU7e9gl8YWvroHcHuPJnBOUu7+OrFjL8DP:KweGq/wKgDefLbt2+OrNcP

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

glgd

Decoy

cdcbullies.com

qidajixie.com

bgimlv.com

sunflowerhybrid.com

kemal.cloud

canadadirect.net

mickey2nd.com

fastjobssearcher.com

tiny-tobi.com

inmedixequus.com

coollifeideas.com

triadelectronicsupply.com

lambyo.com

zxyoo.com

spokanemusicmag.com

sortporn.com

deadroomnyc.com

313mail.com

hexiptv.net

stanbiccargo-express.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5615be335807b5eb2d4c9f59f5f914dd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5615be335807b5eb2d4c9f59f5f914dd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\5615be335807b5eb2d4c9f59f5f914dd_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5615be335807b5eb2d4c9f59f5f914dd_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1916-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1916-14-0x0000000001030000-0x000000000137A000-memory.dmp

    Filesize

    3.3MB

  • memory/2444-6-0x0000000074800000-0x0000000074FB0000-memory.dmp

    Filesize

    7.7MB

  • memory/2444-3-0x00000000059C0000-0x0000000005D14000-memory.dmp

    Filesize

    3.3MB

  • memory/2444-4-0x0000000005910000-0x00000000059A2000-memory.dmp

    Filesize

    584KB

  • memory/2444-5-0x0000000005D20000-0x0000000005DBC000-memory.dmp

    Filesize

    624KB

  • memory/2444-0-0x000000007480E000-0x000000007480F000-memory.dmp

    Filesize

    4KB

  • memory/2444-7-0x00000000073D0000-0x0000000007408000-memory.dmp

    Filesize

    224KB

  • memory/2444-8-0x0000000074800000-0x0000000074FB0000-memory.dmp

    Filesize

    7.7MB

  • memory/2444-9-0x00000000032B0000-0x00000000032C4000-memory.dmp

    Filesize

    80KB

  • memory/2444-10-0x00000000032D0000-0x00000000032D6000-memory.dmp

    Filesize

    24KB

  • memory/2444-2-0x0000000005F70000-0x0000000006514000-memory.dmp

    Filesize

    5.6MB

  • memory/2444-13-0x0000000074800000-0x0000000074FB0000-memory.dmp

    Filesize

    7.7MB

  • memory/2444-1-0x0000000000E10000-0x0000000000EE0000-memory.dmp

    Filesize

    832KB