Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 00:19

General

  • Target

    9ec16b6ca90830f0b441ea3e8165ac6f_JaffaCakes118.exe

  • Size

    814KB

  • MD5

    9ec16b6ca90830f0b441ea3e8165ac6f

  • SHA1

    fc6430b311fcc6176fa5b1cb00f5a173c88c7556

  • SHA256

    31484ef741b768334de711e353731bd89c67711df613b4e175f1205531a53c00

  • SHA512

    0f7e2ed8fb9265466e9de80d0683047628b58624eaa9dd261960c410eea8c6a6e04832f739461659401dec0700521967c210eb7c1be5472c8042f838a5b7e8ad

  • SSDEEP

    12288:vb8bzclUwpdXd04XzCdgfu0JvTkgY05XSn+huL4dxUFxaQOA5i+87QxsBop0wv:vgbeNUgfLxAPeCn+hu3aTA5i+87QxsC

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

fw3d

Decoy

mekohscurls.com

camelbacktownhomes.com

workrelated.net

coukre.com

militiamixedmartialarts.com

oleandrim.net

dgyszxjx.com

admoney.info

myboytoybox.com

caprockacres.com

kenroywilson.com

koheuav.asia

qualifycet.com

safficient.com

alinabica.com

iptvpremiumserver.com

ixiaroboosterprogram.com

societymixersite.club

soulsearcherscny.com

ktwx198.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ec16b6ca90830f0b441ea3e8165ac6f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9ec16b6ca90830f0b441ea3e8165ac6f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wqbGRpDsVtrmh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp580E.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4864
    • C:\Users\Admin\AppData\Local\Temp\9ec16b6ca90830f0b441ea3e8165ac6f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\9ec16b6ca90830f0b441ea3e8165ac6f_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp580E.tmp

    Filesize

    1KB

    MD5

    fd24a5206ccb958d62b81803a88cf762

    SHA1

    679b62f6bb38ae781c4bbf150a7b8078961db3e4

    SHA256

    088692633878fd258a3592b12bfc45d96f54b78ec00810185c68de6955bf50c0

    SHA512

    ae0f5079860258a71e24b575e090c577dfd7ff92bb683de1cdb461e8b660e4e5df3889e3f49855645b968cb5d22723ab1fdf6144261bf39d22575bbf3c794180

  • memory/956-23-0x0000000001AA0000-0x0000000001DEA000-memory.dmp

    Filesize

    3.3MB

  • memory/956-22-0x0000000001AA0000-0x0000000001DEA000-memory.dmp

    Filesize

    3.3MB

  • memory/956-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/5012-8-0x00000000058A0000-0x00000000058F6000-memory.dmp

    Filesize

    344KB

  • memory/5012-11-0x0000000075200000-0x00000000759B0000-memory.dmp

    Filesize

    7.7MB

  • memory/5012-6-0x0000000075200000-0x00000000759B0000-memory.dmp

    Filesize

    7.7MB

  • memory/5012-7-0x0000000003020000-0x000000000302A000-memory.dmp

    Filesize

    40KB

  • memory/5012-0-0x000000007520E000-0x000000007520F000-memory.dmp

    Filesize

    4KB

  • memory/5012-9-0x0000000006CC0000-0x0000000006CD6000-memory.dmp

    Filesize

    88KB

  • memory/5012-10-0x000000007520E000-0x000000007520F000-memory.dmp

    Filesize

    4KB

  • memory/5012-5-0x000000000AA90000-0x000000000AB22000-memory.dmp

    Filesize

    584KB

  • memory/5012-12-0x0000000007060000-0x00000000070FE000-memory.dmp

    Filesize

    632KB

  • memory/5012-13-0x0000000007690000-0x00000000076C4000-memory.dmp

    Filesize

    208KB

  • memory/5012-4-0x000000000B180000-0x000000000B724000-memory.dmp

    Filesize

    5.6MB

  • memory/5012-3-0x000000000AB30000-0x000000000ABCC000-memory.dmp

    Filesize

    624KB

  • memory/5012-21-0x0000000075200000-0x00000000759B0000-memory.dmp

    Filesize

    7.7MB

  • memory/5012-2-0x00000000054C0000-0x0000000005556000-memory.dmp

    Filesize

    600KB

  • memory/5012-1-0x0000000000BE0000-0x0000000000CB2000-memory.dmp

    Filesize

    840KB