Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2024 07:17

General

  • Target

    d5de1d131caf6d485680510898e1d1bf_JaffaCakes118.exe

  • Size

    295KB

  • MD5

    d5de1d131caf6d485680510898e1d1bf

  • SHA1

    e0fb9ca230e0723440c43fd208f36f63956d2dcf

  • SHA256

    92c3ce5b263bedf0e55723eff317e03c62586173fed419e4f62f26c19835b4c5

  • SHA512

    2a1f556726ed46633ec65108cdbff948ec753bb74d6fb535437b613689a211d120f1aa61eb430ce60bf4856bcfbf2ffca1ca970bee8de413099008cb2493515e

  • SSDEEP

    6144:JaYslR8Np2xRgWoriDZvKO2FXztZe6lUnKkSX9nllhVQoijpWy:JaYslmpOUuvh2LlUKkWllhVQph

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

lt0h

Decoy

originalindigofurniture.co.uk

fl6588.com

acecademy.com

yaerofinerindalnalising.com

mendilovic.online

rishenght.com

famlees.com

myhomeofficemarket.com

bouquetarabia.com

chrisbani.com

freebandslegally.com

hernandezinsurancegroup.net

slicedandfresh.com

apnathikanas.com

chadhatesyou.com

ansilsas.com

in3development.com

nitiren.net

peespn.com

valengz.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5de1d131caf6d485680510898e1d1bf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d5de1d131caf6d485680510898e1d1bf_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Users\Admin\AppData\Local\Temp\d5de1d131caf6d485680510898e1d1bf_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d5de1d131caf6d485680510898e1d1bf_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1276-4-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2632-2-0x0000000000280000-0x0000000000282000-memory.dmp

    Filesize

    8KB

  • memory/2632-1-0x0000000000090000-0x0000000000190000-memory.dmp

    Filesize

    1024KB