Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 07:24

General

  • Target

    c691f8063e79e19fa95073108f499b5c_JaffaCakes118.exe

  • Size

    279KB

  • MD5

    c691f8063e79e19fa95073108f499b5c

  • SHA1

    f31d24fa592152a6ad2db064eab64652e313ad0d

  • SHA256

    3cc059736bda2e682c4695af39797d7e32d853db835377647abfb850452d43ad

  • SHA512

    b5afa2d9c1de870a4a9efad4f57cf6182ffb605c2e678519e0a7ccdbaac62421a4029f0466758ea576b546c6babbd5758129f5f8530d4156b4f0518d8ca2f788

  • SSDEEP

    6144:5fLl0j/eF+aXHTwqYxyjp9zgOOUvtahUyjz6j:5fKsXUqZPzIUHj

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

p7t8

Decoy

bretttaylorphotography.com

wishestodreams.com

tinycase.xyz

delawarewebuyhousescash.com

tiennghimini.com

pechnolight.com

sportslivepaly.com

healthygut365.com

briarpatchgrief.com

thenaturalyoushop.com

paulmackaydop.com

psbetongroup.com

luxuosy.com

sesmaseguros.com

mywhyismenow.info

responsivesleepcoaching.com

dokebimetal.com

goodnightfarms.com

fusionhomepackers.com

tiktok-generatofr.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c691f8063e79e19fa95073108f499b5c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c691f8063e79e19fa95073108f499b5c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\c691f8063e79e19fa95073108f499b5c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c691f8063e79e19fa95073108f499b5c_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2220-0-0x0000000074ACE000-0x0000000074ACF000-memory.dmp

    Filesize

    4KB

  • memory/2220-1-0x0000000000A40000-0x0000000000A8C000-memory.dmp

    Filesize

    304KB

  • memory/2220-2-0x00000000004A0000-0x00000000004DA000-memory.dmp

    Filesize

    232KB

  • memory/2220-3-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2220-12-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2512-4-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2512-14-0x0000000000A90000-0x0000000000D93000-memory.dmp

    Filesize

    3.0MB

  • memory/2512-13-0x0000000000401000-0x000000000042E000-memory.dmp

    Filesize

    180KB

  • memory/2512-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2512-9-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2512-8-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2512-6-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB