General
-
Target
JaffaCakes118_5309bd66ae8e9862db4fc8c7221e69b4fab0d4acfc27ad60f8b79b56626ea2d5
-
Size
1.2MB
-
Sample
241225-zchrwaxjfl
-
MD5
4153e97a7f99c8e80ff711b8b84654d3
-
SHA1
b57a11c174cd49da7c01304bdb5f78dc9583c59c
-
SHA256
5309bd66ae8e9862db4fc8c7221e69b4fab0d4acfc27ad60f8b79b56626ea2d5
-
SHA512
8a0daafbd2a43a27974835bffb8163431767ad20a243e928def08dbd13f2ee033a1f6e75dfa88302af84a845d646178bc70a2bf66d2de9ed7f3be0bdc4de776d
-
SSDEEP
24576:swGOGntHnxVwHsfjsHYX/K/lsEwTS0xvEnPVT9lODBoykaqLYdEU+RMqKK:NqtH0As4X/qGZxWdT9lOtBkS+yK
Static task
static1
Behavioral task
behavioral1
Sample
t9w7eLEE781llAk.exe
Resource
win7-20241010-en
Malware Config
Extracted
formbook
4.1
ruje
pelezinhojj.com
tf2landscape.com
dianyuanb2b.com
franklinvisioncenter.net
sdamanagement.net
k7kitchendessert.com
receipeday1.xyz
urbandbracelets.com
lyticstnpasumo5.xyz
pingwangjinrong.com
crocodials.com
beeldacademie.com
loverlykids.com
yougouelectronics.com
ayushbeautypharma.com
fortinetpartnersynergy.com
olimplinfo.xyz
nzn2.com
3brlck.com
htp-352vvm.com
simpsonvillepies.com
handlowe.online
121chesterrd.com
ipswh.com
pledgenwork.com
vaidix.com
estabuloburgers.com
enzactashopping.com
funteefactory.com
darlingfarms.com
hada-kirara.club
masterairlines.com
ghettogypsies.com
influeri.com
muatoolngon.com
dmc--llc.com
dppmediasupplyfestival.com
dot925.com
92f76a.com
hellofix.biz
marhababd.com
xi4c49jppdgi.biz
paypay-tanke.xyz
rzlance.com
wellstabshot.com
brangers2.com
xn--tuarraigoespaa-2nb.com
cvhyd.com
balmitoff.com
supportsmercari.com
yuehuikongjian.com
mixedpatriotapparel.com
creative-constellation.com
3bgoe.info
bjyoulan.com
icebergdazzle.com
mikamike.com
heavenlyhighcreations.com
php.university
freenet-de.xyz
628951.com
gundummy.com
thetokyosubway.com
chandlerfphotography.com
regenerativepatients.com
Targets
-
-
Target
t9w7eLEE781llAk.exe
-
Size
1.3MB
-
MD5
3903301e617641ad7609ca7e09b4bb80
-
SHA1
2544df38e978f6aaf53ca5ccbb4078befa745351
-
SHA256
83f231a4e196b10089d16db819c71bfc5cc543fb55ea5ea63aee2d1285ff3dc3
-
SHA512
fcb598ae444827eb6bdac4567ffcb1b18af792f6d4d19e9b788543994ab5b53529c5df21d45681ec45cd76f49477fa1f789a0db0ad73f00ba6e75272af912851
-
SSDEEP
24576:B7YXNa2kita4HBIb6kFgaGvVNfZM58gN8GdvwPJORyyIwU6XOHtEga:hQa2kit4GksxMOPuvwIKX2Oyga
-
Formbook family
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-