Analysis

  • max time kernel
    93s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 22:47

General

  • Target

    9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    9e59d98eed0bd959f1f5d2ba36e92859

  • SHA1

    d4ebcdefbec753e3074f81f58f067e8545d5bb95

  • SHA256

    3c274255e35e340152ba94463f4b27e0f5f2554062abc27b4ec4d3389545379a

  • SHA512

    24e0a82c24431bca83b39b7c4d30972d2c9023d2cee7a2e2d18732a7f0f39389be036b5debc76c0eacd578b0a9edf62c9eb076338e32a1601a87dd11ddf8edbf

  • SSDEEP

    24576:FSkLO1suaWgV27G0ubgrdCq5/RHAZZS5R09n9Y:FSj1KrV8G7SE3B99

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kgdh

Decoy

socialsecuty.com

rossiniconstruction.com

baliisterstore.com

walnuthotsouce.com

herculesmile.com

datum-maps.tech

yourhandhistory.com

reevolvehardware.com

condosandresorts.com

boissonsenergetiques.com

everybodymatters.club

titoly.com

knfsupplies.com

azitajovaini.com

orfilashop.com

aliceramsay.com

tipsyfetes.com

besttrip.store

ukrainianlandtoken.com

jdscornerbar.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Users\Admin\AppData\Local\Temp\9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\9e59d98eed0bd959f1f5d2ba36e92859_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1336-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1336-15-0x00000000013A0000-0x00000000016EA000-memory.dmp

    Filesize

    3.3MB

  • memory/3672-6-0x0000000006360000-0x00000000063FC000-memory.dmp

    Filesize

    624KB

  • memory/3672-3-0x0000000005050000-0x00000000050E2000-memory.dmp

    Filesize

    584KB

  • memory/3672-4-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/3672-5-0x00000000050F0000-0x00000000050FA000-memory.dmp

    Filesize

    40KB

  • memory/3672-0-0x0000000074EEE000-0x0000000074EEF000-memory.dmp

    Filesize

    4KB

  • memory/3672-7-0x00000000051C0000-0x00000000051DE000-memory.dmp

    Filesize

    120KB

  • memory/3672-8-0x0000000074EEE000-0x0000000074EEF000-memory.dmp

    Filesize

    4KB

  • memory/3672-9-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/3672-10-0x00000000068B0000-0x0000000006954000-memory.dmp

    Filesize

    656KB

  • memory/3672-11-0x0000000008E90000-0x0000000008EC4000-memory.dmp

    Filesize

    208KB

  • memory/3672-2-0x0000000005710000-0x0000000005CB4000-memory.dmp

    Filesize

    5.6MB

  • memory/3672-14-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/3672-1-0x0000000000540000-0x000000000069C000-memory.dmp

    Filesize

    1.4MB