Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/11/2024, 20:23

General

  • Target

    8789a7d58441533a2683aced950d7541_JaffaCakes118.exe

  • Size

    301KB

  • MD5

    8789a7d58441533a2683aced950d7541

  • SHA1

    73f2d3d5e80f7043d3a7e93f31099d115f035894

  • SHA256

    b1c15ea3af11fff459a53839bf25bec6acd4b0bc15ee5bea4b14ee826e0bbbc0

  • SHA512

    68992d4ca8e6b722c329c7f4886a72cf66bef04d3f676b28458928ce69de4473297e67b73db1508586ba55af144f0550a98d7599e02b34f88c1107e3084fdb9d

  • SSDEEP

    6144:QdFH+CC2iyxB/N2aaaaaaaaaaaaapj5YCL4VWsVFzG5pTuyUp+37FHgaafXmQ:QdFPxv37dYCL4ocGbydm7FHM

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

mn9v

Decoy

whitepqags.com

jyps95.com

lkportoes.com

discotwinks.com

samgyupontheway.info

fourtimeseight.com

fossahosting.net

siakadvm.com

mywebpromotion.com

vysocky.coffee

folkloren.com

underwier.agency

moneymatric.com

romaditalialr.com

unfilteredessence.com

viktorlevi.com

curbo.info

sacrilege.church

charlenemee.com

magatv.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8789a7d58441533a2683aced950d7541_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8789a7d58441533a2683aced950d7541_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Users\Admin\AppData\Local\Temp\8789a7d58441533a2683aced950d7541_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\8789a7d58441533a2683aced950d7541_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2532-1-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2532-0-0x0000000000413000-0x0000000000414000-memory.dmp

    Filesize

    4KB

  • memory/2532-3-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2560-4-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB