Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 01:55

General

  • Target

    ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe

  • Size

    345KB

  • MD5

    ca78d54d548798fcf44988d3a89433fd

  • SHA1

    de519e152e3274523c23d58303f049509be2484e

  • SHA256

    d12401aff6e577ad268923a0310d09931870ad0f5c557245376ca0487e4be96d

  • SHA512

    3841d4e9ae04a2b277637f9cf0f8e18fbe1db4e7fd4ff1dbafbf82f663337113fff98cfc6f0a101922798fd69c51d33b01e5c014248f12330ec2f6cadefb43c0

  • SSDEEP

    6144:idy13tEFvM4Mh/K7v97Z2gVdnkcvpkQHrsPMPVNTS8eAWn7woJQnsviWrX6O:idyT6vM4Mhy7RZvVG6fHBVNTSxAiUiWW

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

k1rc

Decoy

manchesterflowerwalls.com

hyperhostns.info

leverj.exchange

bringcovidhome.com

natalieball.com

glaseye.com

buyersmeetsellers.net

dronerealestate.net

calfwag.com

hoodhippy.com

prophunting.com

yange03.com

ffpgv.top

valengz.com

handbagsbreeze.com

excellencepi.com

iopsms.xyz

farmacykauai.com

dmarc.press

aridham.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ca78d54d548798fcf44988d3a89433fd_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2336-2-0x0000000000300000-0x0000000000400000-memory.dmp

    Filesize

    1024KB

  • memory/2336-3-0x0000000000090000-0x0000000000092000-memory.dmp

    Filesize

    8KB

  • memory/2788-4-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2788-5-0x0000000000A60000-0x0000000000D63000-memory.dmp

    Filesize

    3.0MB