Analysis

  • max time kernel
    61s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 00:19

General

  • Target

    9ec16b6ca90830f0b441ea3e8165ac6f_JaffaCakes118.exe

  • Size

    814KB

  • MD5

    9ec16b6ca90830f0b441ea3e8165ac6f

  • SHA1

    fc6430b311fcc6176fa5b1cb00f5a173c88c7556

  • SHA256

    31484ef741b768334de711e353731bd89c67711df613b4e175f1205531a53c00

  • SHA512

    0f7e2ed8fb9265466e9de80d0683047628b58624eaa9dd261960c410eea8c6a6e04832f739461659401dec0700521967c210eb7c1be5472c8042f838a5b7e8ad

  • SSDEEP

    12288:vb8bzclUwpdXd04XzCdgfu0JvTkgY05XSn+huL4dxUFxaQOA5i+87QxsBop0wv:vgbeNUgfLxAPeCn+hu3aTA5i+87QxsC

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

fw3d

Decoy

mekohscurls.com

camelbacktownhomes.com

workrelated.net

coukre.com

militiamixedmartialarts.com

oleandrim.net

dgyszxjx.com

admoney.info

myboytoybox.com

caprockacres.com

kenroywilson.com

koheuav.asia

qualifycet.com

safficient.com

alinabica.com

iptvpremiumserver.com

ixiaroboosterprogram.com

societymixersite.club

soulsearcherscny.com

ktwx198.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ec16b6ca90830f0b441ea3e8165ac6f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9ec16b6ca90830f0b441ea3e8165ac6f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:572
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wqbGRpDsVtrmh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp19D7.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2836
    • C:\Users\Admin\AppData\Local\Temp\9ec16b6ca90830f0b441ea3e8165ac6f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\9ec16b6ca90830f0b441ea3e8165ac6f_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp19D7.tmp

    Filesize

    1KB

    MD5

    0620678cefebe848278f4331f4f8db1c

    SHA1

    46e157ac364d142b917732c6d2fa86fa180770ea

    SHA256

    12d046fda461a61603363aa891157ac0d40201fea80ffa608d8a970749f798d4

    SHA512

    413d31dc73ac58edd5f52faa48973c9193f714bf54bcabb44cc51e2ec27994e6ad1fe615cfabe51ea4ffee5b15db04228ff2045d8a100b73b4e4e932b8146e65

  • memory/572-8-0x0000000000AD0000-0x0000000000B04000-memory.dmp

    Filesize

    208KB

  • memory/572-7-0x000000000B470000-0x000000000B50E000-memory.dmp

    Filesize

    632KB

  • memory/572-3-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/572-4-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/572-1-0x0000000000E80000-0x0000000000F52000-memory.dmp

    Filesize

    840KB

  • memory/572-6-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/572-2-0x0000000000B50000-0x0000000000BE6000-memory.dmp

    Filesize

    600KB

  • memory/572-0-0x000000007469E000-0x000000007469F000-memory.dmp

    Filesize

    4KB

  • memory/572-5-0x000000007469E000-0x000000007469F000-memory.dmp

    Filesize

    4KB

  • memory/572-22-0x0000000074690000-0x0000000074D7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2728-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2728-18-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2728-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2728-21-0x0000000000880000-0x0000000000B83000-memory.dmp

    Filesize

    3.0MB

  • memory/2728-14-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2728-23-0x0000000000880000-0x0000000000B83000-memory.dmp

    Filesize

    3.0MB