Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 12:40

General

  • Target

    9b8ae24db4bf6a9b1201e78b70788ac9_JaffaCakes118.exe

  • Size

    461KB

  • MD5

    9b8ae24db4bf6a9b1201e78b70788ac9

  • SHA1

    443a86c866e28a90413560f2f76947ee9abff4ff

  • SHA256

    5729e17f6dd0c37811c10ffdf485d673ab67dcdc730d0e33ba9701a2e5801b11

  • SHA512

    3d49fda058664ee07ef34e3d227de589cc844680b26106d46b63c86837b24ed0e44379bbf68b86adbb54ad5fa9291110732affb8ad1048858f069db78543b8aa

  • SSDEEP

    12288:lUomEFRu3xEPEy8y6WX9aSqPIvaVJnwHZcQB0:jmOMSPEi6aKVJnqZcQu

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

et

Decoy

askvest.com

lsrp-gaming.com

uugan15.com

smokinpenguin.com

sarandipiagaldar.com

utattemimasita.online

hhay.ltd

reje.ltd

jianzao360.com

myzenithcity.com

intentionallydope.today

javacacaepesca.com

publicservicebot.com

brucesilk.win

akbankdirekttmobile.com

topminidiggers.net

mycarpooltunnel.com

etfs247.com

edsouthey.com

objektschreiner.info

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Users\Admin\AppData\Local\Temp\9b8ae24db4bf6a9b1201e78b70788ac9_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\9b8ae24db4bf6a9b1201e78b70788ac9_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3184
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rundll.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rundll.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4008
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rundll.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rundll.exe"
          4⤵
          • Executes dropped EXE
          PID:4892
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rundll.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rundll.exe"
          4⤵
          • Executes dropped EXE
          PID:1020
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rundll.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rundll.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2372
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy "C:\Users\Admin\AppData\Local\Temp\RarSFX0\*.*" "C:\Users\Admin\AppData\Roaming\Windowa" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3332
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rundll.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\M2

    Filesize

    35B

    MD5

    8e04af7dced40d54c21766c75f3aeea4

    SHA1

    b41faf34a5d667eaa6baae10c39f7b49aab78413

    SHA256

    271c7e4cddfd794486361fc61901edd97ecd78c103a274442751bb11bbd3c6f6

    SHA512

    4b636162c8ce370de01f65ed0f6b13e1ffb28534e60fe938747d150a85d0d86407327da0b1e7be64d7da9338405d6f525415184698b63a49e6d258c2d0133525

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Ogrmkwhrrxoeoao.png

    Filesize

    25KB

    MD5

    ebc1779cff16441f2dd2ac3675ac8dff

    SHA1

    d3f81662f296b54d54ceb9c430176acdaae66e32

    SHA256

    b369e48db7166844d1d9ec3b70737cee72d4dfe367fea7c28332caeddfd57de5

    SHA512

    70e5db64e1f78288ec07aff856803c9eb4415eb7d37638b2bb61f0711ed86f1d23f27c20872838cc0e0fb0b89305926294bc0e2c9be30b574a18a574242c3575

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Zxamvenagxehdojki.xml

    Filesize

    167KB

    MD5

    70c75367f0d65325e490a364132d4923

    SHA1

    3529af9ff9506fe8b3da1a2d0e4e68b4d7765c99

    SHA256

    c0533250cd0852095cd3275e005bafe6b4073ad7b535be91144abd1b38bd294b

    SHA512

    ae5a976dcbb52922ce01992dc0fe170a5a83dc9949103166faa990138b2d5c4ed91d6cfb96b2f0736f6c28aeb046e87cfee78a068ca74c201d28312ae809dd01

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rundll.exe

    Filesize

    89KB

    MD5

    76f16606d8135a4176cc3d5d16e12242

    SHA1

    4584181023a902758365de32afe71ecd5e4b79c7

    SHA256

    878380daa4ae570c7a2c77f2967cd10af23f9f8aed537854f2772c816f3ada55

    SHA512

    26bd3b92b6d4017b3f7e3c4e7a4a2bcea06d8137ee818ca84c79dcff4339a1ba82e231f9c05237ab311a7abbc25e131236d370654d10b1b0343b3a530733dc16

  • memory/1940-41-0x00000000002A0000-0x00000000002A7000-memory.dmp

    Filesize

    28KB

  • memory/2372-42-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2372-29-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3504-46-0x0000000008730000-0x000000000883E000-memory.dmp

    Filesize

    1.1MB

  • memory/4008-20-0x00000000730E0000-0x0000000073691000-memory.dmp

    Filesize

    5.7MB

  • memory/4008-25-0x00000000730E0000-0x0000000073691000-memory.dmp

    Filesize

    5.7MB

  • memory/4008-24-0x00000000730E2000-0x00000000730E3000-memory.dmp

    Filesize

    4KB

  • memory/4008-23-0x00000000730E0000-0x0000000073691000-memory.dmp

    Filesize

    5.7MB

  • memory/4008-19-0x00000000730E0000-0x0000000073691000-memory.dmp

    Filesize

    5.7MB

  • memory/4008-18-0x00000000730E2000-0x00000000730E3000-memory.dmp

    Filesize

    4KB