General
-
Target
JaffaCakes118_71381247497fba4f3392ddd62fe162201e0085a9afe1b3b9d62e7c15281d86e2
-
Size
611KB
-
Sample
241230-g928ns1kfz
-
MD5
baf0d5fcc15f028c10508a0d60a2dfb0
-
SHA1
5c11a2fdab64c8b952a8359fb8c790c976f32347
-
SHA256
71381247497fba4f3392ddd62fe162201e0085a9afe1b3b9d62e7c15281d86e2
-
SHA512
e60ae229bd3518bbbf3f88968997b49eeb48c4190bfbb8f7dbac1b8e8e9689cbb107a55bfa7f4854fe8e7758d5cf8500f02d9cc198a77f44db4060691cfe37e1
-
SSDEEP
12288:qR06sA/rNmUGxyTcCpdiXgVcG9VuZutbsOTnc0NEhKpPrRqz7IL:d1AhHGMRpdesJnE+dEw
Static task
static1
Behavioral task
behavioral1
Sample
PIsept2020.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
wt6
mdjbjsc.com
twosparrowslsbusiness.com
captipe.info
spirtofafrica.com
teacher4today.com
d9masks.com
americanveteransparks.com
originvinylvermont.com
lifeguardboat.net
neynunescuritiba.com
4activelife.xyz
tiniytie.com
schirmenworld.com
nogbeter.com
bikerm.com
higherpurposeproject.com
melloband.com
cremgrs.com
chengyuanwai.com
multiplewealthsecrets.com
77ren.com
freedomwonks.com
tastethe.cloud
busty-italian.com
bingowheels.com
asmarasefera.com
snusmumriken.net
elearningdidatticaadistanza.com
tropicpendants.com
59dzb.com
hopitaldefrance.club
huanxifaka.com
precisioncoffeetools.com
skinjunkyph.com
littlebitlessrisky.com
freethegameboy.info
justiciaabogados.com
harumiyamanaka.com
alexisbekker.com
elzurrondgs.com
becurious.cloud
laeducacionadistancia.com
qualimproov.com
tregroespantry.com
la-voix-des-anges.com
supertron.online
5895hwy93s.com
eliosglaucoma.com
home-business-wealth.com
5gusaphones.com
sweetpeashihtzu.com
mrhadick.com
pizzeriavogelgryff.com
paraneon.com
massagecenterinkarama.com
votececilia.com
krcarts.com
shalagreen20yahoo.com
bird182trading.com
gjjt2019.com
casperbackup.net
usquite.site
postalpoet.com
oneagencyinc.com
ithomar.info
Targets
-
-
Target
PIsept2020.bin
-
Size
714KB
-
MD5
7f63c36771bdf84fdcb80b1b6a8ce300
-
SHA1
7e027829b30e9795006725712c5666f3ff54bdbe
-
SHA256
cba7797f53633aeb00ed0c8418ee90e28b7fe7bc4e787521eef333ff6a67c627
-
SHA512
198cabbf51817d47165c318b3308701ccce4b04ce88712d7984deeda2c52b4baf7bf75758d77a3ceba3c5e22689a8ced13c78322fa2d6a7f950f0bd966f2129f
-
SSDEEP
12288:EsyixjQfJkrWEm0Zux8Y8nMdByNjolspgZRZu48Jcx0Ksz5XxM4Sh:EsyIjfo0Q6NnasNjoe2vf9x0Ko5Srh
-
Formbook family
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1