Analysis

  • max time kernel
    94s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2025 04:39

General

  • Target

    JaffaCakes118_8c0ee1047417c73e05ff20905963357e.exe

  • Size

    830KB

  • MD5

    8c0ee1047417c73e05ff20905963357e

  • SHA1

    4870480c602168a6b0d5572810ca7289107df0d9

  • SHA256

    6d6ed63e357100a38b5bb4f4a256be07e34960bf25dbf0cc7d8f6b66e06d2df3

  • SHA512

    7005b8ffcb3837deb0f4e238ae60d8037c83e12d4b3e911efaba6d414e6c52deeef4cf2b8bf26bec2e720edd870ba2d4570a6ad92ce40db0037efac2b0c4c41e

  • SSDEEP

    24576:TLnGQYTq2UThCPIrkZZAF4tDc0eYOsUjzR:fxYT9/AkHAOtPWsazR

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cb2k

Decoy

prets-personnels-faciles-1.com

lavandica.com

855goldenpark.com

ebrandschool.com

annielaineinspirations.com

tuscumbiadivorceattorney.com

lovarebanwgt74.xyz

car-plus.info

fireloops.net

psychtechsolutions.com

didubreak.com

cursodesigndesobrancelhas.com

berrymyrick.com

visit-croatia-now.com

chamonix-cars.club

1679tnpnd01uzznpvfu8795.com

noisedelayrecovery.com

sergiotimoteo.com

lplc.cloud

ppezjo.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c0ee1047417c73e05ff20905963357e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c0ee1047417c73e05ff20905963357e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LyTtZRlfdo" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE5.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4992
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c0ee1047417c73e05ff20905963357e.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpE5.tmp

    Filesize

    1KB

    MD5

    777c0c48a95c2fe21bb99e6ad964330c

    SHA1

    6e63cd329d0aebeebb0608f602b6be15cdef434e

    SHA256

    f3f8c44f6dd4f9e67a1db9b70bc04db1101e0bd3dd07a527664ae35ce798f253

    SHA512

    215fd3c73922db3013ef0dbf44ac688a231831879dbe7b797b7f09db5e3599ac2df8b71021db4eee3b0f5443fd986c1cea7780411b8ed51b82fd4b772bd29c74

  • memory/3096-19-0x0000000001B00000-0x0000000001E4A000-memory.dmp

    Filesize

    3.3MB

  • memory/3096-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3616-8-0x0000000007CB0000-0x0000000007CC4000-memory.dmp

    Filesize

    80KB

  • memory/3616-10-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/3616-5-0x00000000050C0000-0x00000000050CA000-memory.dmp

    Filesize

    40KB

  • memory/3616-6-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/3616-7-0x0000000005340000-0x0000000005396000-memory.dmp

    Filesize

    344KB

  • memory/3616-0-0x0000000074AEE000-0x0000000074AEF000-memory.dmp

    Filesize

    4KB

  • memory/3616-9-0x0000000074AEE000-0x0000000074AEF000-memory.dmp

    Filesize

    4KB

  • memory/3616-4-0x0000000005100000-0x0000000005192000-memory.dmp

    Filesize

    584KB

  • memory/3616-11-0x0000000007E90000-0x0000000007F18000-memory.dmp

    Filesize

    544KB

  • memory/3616-12-0x000000000A5E0000-0x000000000A614000-memory.dmp

    Filesize

    208KB

  • memory/3616-3-0x00000000056B0000-0x0000000005C54000-memory.dmp

    Filesize

    5.6MB

  • memory/3616-2-0x0000000005020000-0x00000000050BC000-memory.dmp

    Filesize

    624KB

  • memory/3616-18-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/3616-1-0x0000000000590000-0x0000000000666000-memory.dmp

    Filesize

    856KB