Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/01/2025, 23:18

General

  • Target

    JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe

  • Size

    821KB

  • MD5

    b23c8de2a3a56e2fb8bacb085dbd9d19

  • SHA1

    5957dbee0b2b200110787aac267be09bcecbeda2

  • SHA256

    027eae741aaf031d2edcdc08920457e4c2e641c33847d67705d791f124b7781e

  • SHA512

    a696b8e4cdbca841f2ecae342d8aa61c9ac9adc0849e69c715f3f3ce7b5195711bf4a22ad8c2add5bf1962d6a6cb18b751abbe73711699bce59199bd09ad2a63

  • SSDEEP

    12288:kx/qRSt2dKOvWmr8VI7FitZ+TaioANCif4hdMkuvMNptn0UxqJFTP5ijOE0FPgOe:kxyvKOvLr8K7FiCTaiS1vaqqFM

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

mo9n

Decoy

circuit-town.com

stock-high.xyz

barlindelivery.com

littletoucans.com

bright-tailor.com

firsthandcares.com

ecompropeller.com

circuitoalberghiero.net

creative-egyptps.com

bitracks56.com

douhonghong.com

fingertipcollection.com

happy-bihada.space

blockchainairdropreward.com

xn--reljame-jwa.com

polloycarnesdelivery.com

d22.group

eslamshahrservice.com

vanzing.com

juzide.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe
      "{path}"
      2⤵
        PID:2708
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe
        "{path}"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2732-13-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2732-16-0x0000000001080000-0x00000000013CA000-memory.dmp

      Filesize

      3.3MB

    • memory/4420-8-0x0000000005970000-0x0000000005984000-memory.dmp

      Filesize

      80KB

    • memory/4420-9-0x000000007534E000-0x000000007534F000-memory.dmp

      Filesize

      4KB

    • memory/4420-5-0x0000000075340000-0x0000000075AF0000-memory.dmp

      Filesize

      7.7MB

    • memory/4420-4-0x00000000056B0000-0x0000000005742000-memory.dmp

      Filesize

      584KB

    • memory/4420-7-0x00000000058A0000-0x00000000058F6000-memory.dmp

      Filesize

      344KB

    • memory/4420-6-0x00000000055B0000-0x00000000055BA000-memory.dmp

      Filesize

      40KB

    • memory/4420-0-0x000000007534E000-0x000000007534F000-memory.dmp

      Filesize

      4KB

    • memory/4420-3-0x0000000005C60000-0x0000000006204000-memory.dmp

      Filesize

      5.6MB

    • memory/4420-10-0x0000000075340000-0x0000000075AF0000-memory.dmp

      Filesize

      7.7MB

    • memory/4420-11-0x00000000085A0000-0x0000000008628000-memory.dmp

      Filesize

      544KB

    • memory/4420-12-0x000000000AD30000-0x000000000AD64000-memory.dmp

      Filesize

      208KB

    • memory/4420-2-0x0000000005610000-0x00000000056AC000-memory.dmp

      Filesize

      624KB

    • memory/4420-15-0x0000000075340000-0x0000000075AF0000-memory.dmp

      Filesize

      7.7MB

    • memory/4420-1-0x0000000000790000-0x0000000000864000-memory.dmp

      Filesize

      848KB