Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 12:49

General

  • Target

    b156ebc4529e10eafdd3a7a22193e892_JaffaCakes118.exe

  • Size

    223KB

  • MD5

    b156ebc4529e10eafdd3a7a22193e892

  • SHA1

    9b123124f0da7d54e0185256853aa9a98d015fdc

  • SHA256

    6d5c7a67d4be55d1bc629e30053d4a143ce1b27f681e5a426e00bf99784b31eb

  • SHA512

    717dfd96fd65c2477942fea0bd5712f7bd11ee8603f49d75d4995c44fe33b278ce28dc18358c940ae7fc92f906011ee80c290b798a90f1c7c27b8b5f7ce61bdf

  • SSDEEP

    6144:AJsrgPaJ/lSAvspsCTIHDKfqxxX7pXmBg:AHi/l2sCcjmiX7pXmBg

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

hdno

Decoy

tasteofsteak.com

lovedemingamerica.com

arizonaad.com

allbeautystation.com

theskinnybody.net

mywashbuddy.com

newspeak.watch

groomgarden.com

recommendproperty.com

pingshanhai.com

tianzeelectric.com

5335466.com

derbyescorts.com

quincyfreemannovels.com

ppeexchangeus.com

thesandcapital.com

natura.frl

twobonus.net

irx1.com

333lucky.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b156ebc4529e10eafdd3a7a22193e892_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b156ebc4529e10eafdd3a7a22193e892_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\b156ebc4529e10eafdd3a7a22193e892_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\b156ebc4529e10eafdd3a7a22193e892_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2184-3-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2184-4-0x0000000000AB0000-0x0000000000DB3000-memory.dmp

    Filesize

    3.0MB

  • memory/2184-5-0x0000000000AB0000-0x0000000000DB3000-memory.dmp

    Filesize

    3.0MB

  • memory/2400-2-0x0000000000130000-0x0000000000132000-memory.dmp

    Filesize

    8KB

  • memory/2400-1-0x0000000000240000-0x0000000000340000-memory.dmp

    Filesize

    1024KB