Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 07:50

General

  • Target

    ea9f9fc409b8e70415b11bfcf37e09e1_JaffaCakes118.exe

  • Size

    557KB

  • MD5

    ea9f9fc409b8e70415b11bfcf37e09e1

  • SHA1

    13fe23e9334428c7898657f094db5cb234000ac6

  • SHA256

    43391d3abc411fd3198710c32127898396759f1372ee99fb3aea8efd8e50d086

  • SHA512

    e1c78808853ed762730895295ec6e775287de98c4f797da134cc45315d9b3b67059f7e4b96ec9d6581f7545887b5cf566b12df9e894c657637601661edbd419f

  • SSDEEP

    12288:Ya2DLn2MOytQK+HUdA0Y56roAC+tgy/UbJs42AvTR9Tn2HW13A:ODq5ytQeSZaoW4xRJn2oA

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

z8bb

Decoy

bg0bpz.xyz

heelncheel.com

full-port.com

77se999.xyz

kentaa.xyz

nemsdumbloser.com

xn--par-tma.art

basculasonline.com

brt-cloud.com

ankesolutions.com

cappersacces.com

lessonsdrums.com

tastygentleman.com

yuzhou.plus

cursando-online.com

comfortzone-frankfurt.com

natesmining.com

logjec070.xyz

manualidadesencasa.net

rowdyravers.club

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea9f9fc409b8e70415b11bfcf37e09e1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea9f9fc409b8e70415b11bfcf37e09e1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Users\Admin\AppData\Local\Temp\ea9f9fc409b8e70415b11bfcf37e09e1_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ea9f9fc409b8e70415b11bfcf37e09e1_JaffaCakes118.exe"
      2⤵
        PID:3484
      • C:\Users\Admin\AppData\Local\Temp\ea9f9fc409b8e70415b11bfcf37e09e1_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\ea9f9fc409b8e70415b11bfcf37e09e1_JaffaCakes118.exe"
        2⤵
          PID:3144
        • C:\Users\Admin\AppData\Local\Temp\ea9f9fc409b8e70415b11bfcf37e09e1_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\ea9f9fc409b8e70415b11bfcf37e09e1_JaffaCakes118.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4864

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4204-6-0x0000000007820000-0x00000000078BC000-memory.dmp

        Filesize

        624KB

      • memory/4204-8-0x000000007502E000-0x000000007502F000-memory.dmp

        Filesize

        4KB

      • memory/4204-2-0x0000000005550000-0x0000000005AF4000-memory.dmp

        Filesize

        5.6MB

      • memory/4204-3-0x0000000005040000-0x00000000050D2000-memory.dmp

        Filesize

        584KB

      • memory/4204-4-0x00000000051E0000-0x00000000051EA000-memory.dmp

        Filesize

        40KB

      • memory/4204-5-0x0000000075020000-0x00000000757D0000-memory.dmp

        Filesize

        7.7MB

      • memory/4204-1-0x0000000000730000-0x00000000007C2000-memory.dmp

        Filesize

        584KB

      • memory/4204-7-0x0000000007790000-0x000000000779C000-memory.dmp

        Filesize

        48KB

      • memory/4204-0-0x000000007502E000-0x000000007502F000-memory.dmp

        Filesize

        4KB

      • memory/4204-9-0x0000000075020000-0x00000000757D0000-memory.dmp

        Filesize

        7.7MB

      • memory/4204-10-0x0000000007C90000-0x0000000007CFA000-memory.dmp

        Filesize

        424KB

      • memory/4204-11-0x0000000007E20000-0x0000000007E56000-memory.dmp

        Filesize

        216KB

      • memory/4204-14-0x0000000075020000-0x00000000757D0000-memory.dmp

        Filesize

        7.7MB

      • memory/4864-12-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4864-15-0x00000000016D0000-0x0000000001A1A000-memory.dmp

        Filesize

        3.3MB