Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2025, 05:25

General

  • Target

    JaffaCakes118_10f79865e6d977fa0d9f5d4a12ac7fac.exe

  • Size

    813KB

  • MD5

    10f79865e6d977fa0d9f5d4a12ac7fac

  • SHA1

    c05d245928e4c06f1591187d595786ffcb57584a

  • SHA256

    e6cb9330e6bbd16bdd58aac76070200e17389a45c4aead703d4ab970038ff8a2

  • SHA512

    5ba202c0fcf9dbffd0dbf3a1310978469c55a764876eddc2d02e66f01e707890de510a73595d43cf1f6b7c7769b4e2a756abe75d48f805aae34d78d8709b500c

  • SSDEEP

    12288:0swHXdkqRSFdMkuvMNptn0UOxgT2KoxyJ/4cg73t76T1kruzG3+plaqJFTP7ye06:LwHNzovaxxg6KIGfg1O1OmG3klaqvy0

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

snr6

Decoy

jjglassmi1.com

vpsseattle.com

drfllc.top

staycoolonline.com

eptlove.com

solusimatasehat.site

ionrarecharlestonproperties.com

b3eflucg.xyz

tvchosun-usa.com

mmahzxwzsadqlshop.life

gospelimport.com

demoapps.website

jackburst54.com

99rocket.education

ccbwithbri.com

trapperairsoft.com

useroadly.com

ralphlaurenonline-nl.com

loanmaster4u.com

champ-beauty-tomigaoka-nail.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10f79865e6d977fa0d9f5d4a12ac7fac.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10f79865e6d977fa0d9f5d4a12ac7fac.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10f79865e6d977fa0d9f5d4a12ac7fac.exe
      "{path}"
      2⤵
        PID:4972
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10f79865e6d977fa0d9f5d4a12ac7fac.exe
        "{path}"
        2⤵
          PID:3384
        • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10f79865e6d977fa0d9f5d4a12ac7fac.exe
          "{path}"
          2⤵
            PID:5048
          • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10f79865e6d977fa0d9f5d4a12ac7fac.exe
            "{path}"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2288

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2288-13-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2288-17-0x0000000001860000-0x0000000001BAA000-memory.dmp

          Filesize

          3.3MB

        • memory/2288-16-0x0000000001860000-0x0000000001BAA000-memory.dmp

          Filesize

          3.3MB

        • memory/4384-8-0x00000000060A0000-0x00000000060B4000-memory.dmp

          Filesize

          80KB

        • memory/4384-10-0x0000000074EE0000-0x0000000075690000-memory.dmp

          Filesize

          7.7MB

        • memory/4384-5-0x0000000005DF0000-0x0000000005E82000-memory.dmp

          Filesize

          584KB

        • memory/4384-6-0x0000000005D70000-0x0000000005D7A000-memory.dmp

          Filesize

          40KB

        • memory/4384-7-0x0000000005F80000-0x0000000005FD6000-memory.dmp

          Filesize

          344KB

        • memory/4384-0-0x0000000074EEE000-0x0000000074EEF000-memory.dmp

          Filesize

          4KB

        • memory/4384-9-0x0000000074EEE000-0x0000000074EEF000-memory.dmp

          Filesize

          4KB

        • memory/4384-4-0x0000000074EE0000-0x0000000075690000-memory.dmp

          Filesize

          7.7MB

        • memory/4384-11-0x00000000072A0000-0x0000000007326000-memory.dmp

          Filesize

          536KB

        • memory/4384-12-0x0000000007370000-0x00000000073A4000-memory.dmp

          Filesize

          208KB

        • memory/4384-3-0x0000000006300000-0x00000000068A4000-memory.dmp

          Filesize

          5.6MB

        • memory/4384-15-0x0000000074EE0000-0x0000000075690000-memory.dmp

          Filesize

          7.7MB

        • memory/4384-2-0x0000000005CB0000-0x0000000005D4C000-memory.dmp

          Filesize

          624KB

        • memory/4384-1-0x0000000000EB0000-0x0000000000F82000-memory.dmp

          Filesize

          840KB