Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 10:48

General

  • Target

    b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe

  • Size

    700KB

  • MD5

    b0c1602dbb50fc0176f12b13a5b0f488

  • SHA1

    0cda636c741659c4da49cec32825c51da7a2aad7

  • SHA256

    33de0b92d4271914e3525fff936097d35cb6cb96ed21b0ff0d2970d9c67d4872

  • SHA512

    17da91f0fa8eaa3f435d44ead5b0f708b45de377176cb62ab1d318ea35e404641ff809357d16fdebb6a7bdf40a10048f6dcbf4f3ea7fd87e834d0a5950260163

  • SSDEEP

    12288:gzbQ+X8+UiDLbRHahwUOJXfoQLaxCvqin9tDmdv3x26xTKPCGJ:gzbQ+X8+UiDLbRHahwUgXfoNMTC/xLT2

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m8g0

Decoy

trypapaya.pro

instructorcornernet.com

techadvisorsfl.com

raunnan.com

filestune.com

learnitanywhereskills.com

beaullife.com

getcovidwear.com

tkrbeautyinstitut.com

lisaphamkhai.com

iconicdds.com

ksoopawlas.com

testosteron.store

jctaketwo.com

awexz.online

onlinening.com

steelwerkschicago.com

lukakordic.com

expertsofcoaching.com

dashcca.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Users\Admin\AppData\Local\Temp\b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\b0c1602dbb50fc0176f12b13a5b0f488_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2560-6-0x0000000004E70000-0x0000000004EE6000-memory.dmp

    Filesize

    472KB

  • memory/2560-8-0x0000000004870000-0x00000000048B2000-memory.dmp

    Filesize

    264KB

  • memory/2560-2-0x0000000074020000-0x000000007470E000-memory.dmp

    Filesize

    6.9MB

  • memory/2560-3-0x0000000000580000-0x000000000059A000-memory.dmp

    Filesize

    104KB

  • memory/2560-4-0x000000007402E000-0x000000007402F000-memory.dmp

    Filesize

    4KB

  • memory/2560-5-0x0000000074020000-0x000000007470E000-memory.dmp

    Filesize

    6.9MB

  • memory/2560-1-0x00000000010D0000-0x0000000001186000-memory.dmp

    Filesize

    728KB

  • memory/2560-7-0x0000000000690000-0x0000000000696000-memory.dmp

    Filesize

    24KB

  • memory/2560-0-0x000000007402E000-0x000000007402F000-memory.dmp

    Filesize

    4KB

  • memory/2560-16-0x0000000074020000-0x000000007470E000-memory.dmp

    Filesize

    6.9MB

  • memory/2924-15-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2924-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2924-9-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2924-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2924-17-0x0000000000930000-0x0000000000C33000-memory.dmp

    Filesize

    3.0MB