General
-
Target
JaffaCakes118_895fafaba3dd9be186361c1532b486678371684b42018ca3902306a1b43b1d63
-
Size
1.1MB
-
Sample
241223-syqahstlcp
-
MD5
2fecc74eb9e6b3c6bd3a3608bd31f937
-
SHA1
720aec66186548b4f24e11ad393e994f71d32b44
-
SHA256
895fafaba3dd9be186361c1532b486678371684b42018ca3902306a1b43b1d63
-
SHA512
0f2be3931058823bb2c39aeeb50801ec882ef6dcc53a6a78fc30668e15662b50f4019c9cec04f877db1c7ea6880c5499dfebd3e6d69ae76c72184a607a17cf79
-
SSDEEP
24576:MMhOIl9kkc2fOVeTk0L/WRtNe5uFp2HBjugcIttc3GuQ2:XOMkd2fsw5C8E2HBRPtIGuQ2
Static task
static1
Behavioral task
behavioral1
Sample
a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
ubpr
ptpVli2do9q89N0=
+CSLnNslIIErRTE3deUw4HXnuqwqG4+WpQ==
5IBw+rDmyajH6J9b0Gc0
ITivu/UzzGQKCQ==
qNw+VJ7Ni+WT3pA2e/8=
6VzmXNT+607aCN1UmHCt1CjO
a+xfszZjSqdZhCfX5fXnJkJFIsuN8Ns=
DLyp4MD0xUCL6olI
kysKo0J45suL6olI
oE/eN+zqkP2lyG6YYSalUA==
Rko77gUFcKTQFA==
cW14AsnTkUOf0N6ODWjpj7S6nRI=
M9yx/sTJbmx2vzUeWQ==
SQJdWnStlfaz6J0M04r3MN8=
FLhBiiYfyjfZFOdgHU1SfmVhAGgV
nKgaME1YHRs+cHTkn4oI3ibO
vuZIRIyKMaBGiUl9iaiZxNc=
UPnZdBQV1nzxKB1N
iARlleEZxTSL6olI
w5hz+KfftpWkwox0yH7vo0GrwW7RjWVk
kaAqSHu4ptq89N0=
O3CziqftBeLwA/njKyEj
vEA50pDJigF0lGYgHjpxEKcyYwptHg==
FMKdK8wNgWCCk2VoZEOzVg==
fRoOiiZaKdVAf3NrZEOzVg==
VV7kVQYSwS7URRkgBDOkoofG
FDCembDq2Ee/zcFv74GglorM
Ew4U5xiDinh6vzUeWQ==
oa0omDh482X4
GMJJhyAr8eT0BvwvPVR/FrM2YwptHg==
EbK9tuhdalRecoo644iIkj9DIsuN8Ns=
BSB/Wnq0phHM/9QdXe0m
5OreiLv1t7DXAJ3RQor3MN8=
1FLV4uTTfGJqnGjAQIr3MN8=
7wNnVm2qnfGAtmnjKyEj
XNIl9g0/IIo6fxFOkJSlQQ==
GqKXJqeNLItAf3NrZEOzVg==
XGjNyMwsEQQQN9ONj6l/mWRgLX9yNs9o
coiiIb821K/ZFg==
ksuTEwh482X4
StAxCChpaNd3xZSQKOI=
tMQmkECyqdq89N0=
g6cSUeTcl3qs9vfjKyEj
O2ZtSFV9QaxGhjn6HPJM5sg=
UHuKZ6aqS0NMao4Q04r3MN8=
+ZT0vdwV+Fv5fxrkTg==
V3LM/5aLNw4eJOPcNNbU9LfM+SADc9lu
8nxx8Ym7kGx6vzUeWQ==
RGC8z9vhxTLC0oQtQFukoofG
p+RabJvdzT3hD/V1KjpBaK82Q+5gFA==
XwrgMNhLwTSL6olI
2wFqerDrwyfL+JA2e/8=
X+hjpg42E4cWVTr0rKz1sdc=
MWbPFJXPtRem3ZA2e/8=
ehqd5mybcsVgcWljmz6rBcU6LA==
CYv3RsGEG4kGJfzGnx5JeLIyYwptHg==
rMoZJg7CvZugrmpgZEOzVg==
cCAL2ucb8pgASPgsXw==
zdzTL77u0XzxKB1N
1tgMUk5GBVng+JA2e/8=
HZwKXN4G8En3KOClsdbtEVvkIo5yNs9o
/v9Chjqlo9q89N0=
WvwFmBkDkvGKrBAQGhgh
5hiIh5S9nP2Jn41FkJSlQQ==
gopro-one.com
Targets
-
-
Target
a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f
-
Size
1.2MB
-
MD5
8f6f8bc43de5fbdddedb774a22e3dca1
-
SHA1
3f48029084649e39963710b0ae114b4663d48e68
-
SHA256
a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f
-
SHA512
ff48e557c37a8ebda2d9504727681dca35353003e87369e5462fb20a1c4746fb998200130b23518288a2bf7c4af06e8853937251af7b2c17e94a46d39b991797
-
SSDEEP
24576:7AOcZX4ctcwhwheT60L/2NgeSMj5HHeg/cbGOSMIEn:dPwhUwvfe/5HdYGOSMV
-
Formbook family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1