Analysis

  • max time kernel
    117s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 19:18

General

  • Target

    JaffaCakes118_1b9347ac7827deee5e937a9463fe3f03d8326740ca9d1661bf09c58905c264a6.exe

  • Size

    910KB

  • MD5

    b78da72b0e4575c3e418368d90047ede

  • SHA1

    ebdda1744d5fc972a3694461f2a95e34a0fcbfe4

  • SHA256

    1b9347ac7827deee5e937a9463fe3f03d8326740ca9d1661bf09c58905c264a6

  • SHA512

    0c0a388e923682fac8f06173ae5a7b4c2c40ac05a8ae5833386cf58a86c8596aa5d924731a19990068c60866f0db30a9e43ea03dcbba3a2301affd11e04e412b

  • SSDEEP

    12288:TJnpqt+UJF8Y4yDYiekcykYp/z1yGbhxWRwkzUNEnaZGnQ767INeLc:do4yDYiJcykYdKSN2oGnKNeLc

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

nyk

Decoy

mrlens.net

timeindolls.com

mov.solutions

byonf.com

truenotice.com

thetennesseebarn.com

emiss.online

smallfryspharmacy.com

100percentbikes.com

nanshanbishengke.com

hellohomeowner.com

investorvisa4uk.com

majesticpoodlehomes.com

zaoresorthouse.com

projewelrys.com

adherellc.xyz

usamamembers.com

buygreatsales.com

seniordevops.world

bungalowfollowbestowed.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9347ac7827deee5e937a9463fe3f03d8326740ca9d1661bf09c58905c264a6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9347ac7827deee5e937a9463fe3f03d8326740ca9d1661bf09c58905c264a6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9347ac7827deee5e937a9463fe3f03d8326740ca9d1661bf09c58905c264a6.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9347ac7827deee5e937a9463fe3f03d8326740ca9d1661bf09c58905c264a6.exe"
      2⤵
        PID:3916
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9347ac7827deee5e937a9463fe3f03d8326740ca9d1661bf09c58905c264a6.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9347ac7827deee5e937a9463fe3f03d8326740ca9d1661bf09c58905c264a6.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1504-13-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1504-16-0x0000000001900000-0x0000000001C4A000-memory.dmp

      Filesize

      3.3MB

    • memory/2736-8-0x0000000005ED0000-0x0000000005EDA000-memory.dmp

      Filesize

      40KB

    • memory/2736-9-0x00000000749FE000-0x00000000749FF000-memory.dmp

      Filesize

      4KB

    • memory/2736-4-0x00000000053E0000-0x000000000547C000-memory.dmp

      Filesize

      624KB

    • memory/2736-5-0x0000000005380000-0x000000000538A000-memory.dmp

      Filesize

      40KB

    • memory/2736-6-0x00000000749F0000-0x00000000751A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2736-7-0x00000000749F0000-0x00000000751A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2736-0-0x00000000749FE000-0x00000000749FF000-memory.dmp

      Filesize

      4KB

    • memory/2736-3-0x00000000052A0000-0x0000000005332000-memory.dmp

      Filesize

      584KB

    • memory/2736-10-0x00000000749F0000-0x00000000751A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2736-11-0x0000000006210000-0x0000000006298000-memory.dmp

      Filesize

      544KB

    • memory/2736-12-0x0000000008760000-0x00000000087A6000-memory.dmp

      Filesize

      280KB

    • memory/2736-2-0x0000000005850000-0x0000000005DF4000-memory.dmp

      Filesize

      5.6MB

    • memory/2736-15-0x00000000749F0000-0x00000000751A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2736-1-0x0000000000920000-0x0000000000A08000-memory.dmp

      Filesize

      928KB