Analysis

  • max time kernel
    146s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 11:44

General

  • Target

    a97f874d6313ccfefceec77c2ccf1fda_JaffaCakes118.rtf

  • Size

    814KB

  • MD5

    a97f874d6313ccfefceec77c2ccf1fda

  • SHA1

    0b140d33ec06f7387ad3763e30c091b255d4115e

  • SHA256

    b5abd46caecf027f71d1dc3c78d490092a82d70dea355cf83523a70b6967be6e

  • SHA512

    fd8e26830e6a511ae8b16cd6798cde208bf0584ba4f89fd2321b6a47ccde401860bbec1485904dea0feae42349b553744711d4e5d3bf3b4631bb9119b1b69110

  • SSDEEP

    12288:e+WhWEyIueil9U4zx+InkxPn6L7KHPpwsXafAJJDBuoMY3l9Uae:eIRIWl9U4zUNP6HnqafAv1n3l9UB

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

ch35

Decoy

sitepm.site

chancein.net

urbanairer.com

jxzr888.com

maynewyork.com

snowcamel.net

montqranite.com

beijingplanettrading.com

private-placement-program.com

cureguru.com

elementorlandosouthwest.com

ohdoll.com

sunsationalpools.net

bionic.claims

0pe485.com

cc1231.com

waterdamagesoluton.online

melionp.reisen

bioepidemic.foundation

iprofi.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Formbook payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Launches Equation Editor 1 TTPs 2 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1132
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a97f874d6313ccfefceec77c2ccf1fda_JaffaCakes118.rtf"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tAsK.bAt
        3⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\2nd.bat
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Windows\SysWOW64\timeout.exe
            TIMEOUT 1
            5⤵
            • Delays execution with timeout.exe
            PID:2800
          • C:\Users\Admin\AppData\Local\Temp\exe.exe
            C:\Users\Admin\AppData\Local\Temp\ExE.ExE
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:1728
            • C:\Users\Admin\AppData\Local\Temp\exe.exe
              C:\Users\Admin\AppData\Local\Temp\ExE.ExE
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:2752
          • C:\Windows\SysWOW64\taskkill.exe
            TASKKILL /F /IM winword.exe
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1548
          • C:\Windows\SysWOW64\reg.exe
            reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\8.0\Word\Resiliency /f
            5⤵
              PID:1516
            • C:\Windows\SysWOW64\reg.exe
              reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Word\Resiliency /f
              5⤵
                PID:1512
              • C:\Windows\SysWOW64\reg.exe
                reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Word\Resiliency /f
                5⤵
                  PID:1864
                • C:\Windows\SysWOW64\reg.exe
                  reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Word\Resiliency /f
                  5⤵
                    PID:1876
                  • C:\Windows\SysWOW64\reg.exe
                    reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\12.0\Word\Resiliency /f
                    5⤵
                      PID:1916
                    • C:\Windows\SysWOW64\reg.exe
                      reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency /f
                      5⤵
                        PID:1612
                      • C:\Windows\SysWOW64\reg.exe
                        reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Word\Resiliency /f
                        5⤵
                          PID:1984
                        • C:\Windows\SysWOW64\reg.exe
                          reg delete HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency /f
                          5⤵
                            PID:2256
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\8.0\Word\File MRU" /v "Item 1"
                            5⤵
                              PID:2260
                              • C:\Windows\SysWOW64\reg.exe
                                REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\8.0\Word\File MRU" /v "Item 1"
                                6⤵
                                  PID:2324
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\9.0\Word\File MRU" /v "Item 1"
                                5⤵
                                  PID:872
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\9.0\Word\File MRU" /v "Item 1"
                                    6⤵
                                      PID:344
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\10.0\Word\File MRU" /v "Item 1"
                                    5⤵
                                      PID:752
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\10.0\Word\File MRU" /v "Item 1"
                                        6⤵
                                          PID:2588
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\11.0\Word\File MRU" /v "Item 1"
                                        5⤵
                                          PID:2368
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\11.0\Word\File MRU" /v "Item 1"
                                            6⤵
                                              PID:2448
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\12.0\Word\File MRU" /v "Item 1"
                                            5⤵
                                              PID:2608
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\12.0\Word\File MRU" /v "Item 1"
                                                6⤵
                                                  PID:2264
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\14.0\Word\File MRU" /v "Item 1"
                                                5⤵
                                                  PID:1688
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\14.0\Word\File MRU" /v "Item 1"
                                                    6⤵
                                                      PID:1452
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Word\File MRU" /v "Item 1"
                                                    5⤵
                                                      PID:1436
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Word\File MRU" /v "Item 1"
                                                        6⤵
                                                          PID:1464
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\File MRU" /v "Item 1"
                                                        5⤵
                                                          PID:1552
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\File MRU" /v "Item 1"
                                                            6⤵
                                                              PID:1484
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tAsK.bAt
                                                        3⤵
                                                        • Process spawned unexpected child process
                                                        PID:1856
                                                    • C:\Windows\SysWOW64\cmmon32.exe
                                                      "C:\Windows\SysWOW64\cmmon32.exe"
                                                      2⤵
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious behavior: MapViewOfSection
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2620
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /c del "C:\Users\Admin\AppData\Local\Temp\exe.exe"
                                                        3⤵
                                                          PID:2892
                                                    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                      1⤵
                                                      • Launches Equation Editor
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2732
                                                      • C:\Windows\SysWOW64\CmD.exe
                                                        CmD /C %tmp%\task.bat & UUUUUUUU c
                                                        2⤵
                                                          PID:2976
                                                      • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                        "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                        1⤵
                                                        • Launches Equation Editor
                                                        PID:2548

                                                      Network

                                                      MITRE ATT&CK Matrix ATT&CK v13

                                                      Execution

                                                      Exploitation for Client Execution

                                                      1
                                                      T1203

                                                      Defense Evasion

                                                      Modify Registry

                                                      1
                                                      T1112

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Temp\2nd.bat
                                                        Filesize

                                                        2KB

                                                        MD5

                                                        32a83d79acd18ac3776b3b51298d3a9f

                                                        SHA1

                                                        c2a669ac6e371c6cd3b024e114a9a5004cb81500

                                                        SHA256

                                                        4e738ef995c9c1f0d314a391e047c86439e5294d7778c6d034320d8607f9d604

                                                        SHA512

                                                        f503e6ff3089ce9cf8071e96072a576c55c61404731d70207ce137b37c7e01895b5c75b3766fd6bacfb0942a41ad8a7c0a5b7d5d0bd3b4473f6d680054b83199

                                                      • C:\Users\Admin\AppData\Local\Temp\exe.exe
                                                        Filesize

                                                        344KB

                                                        MD5

                                                        921feeabdaf221126606c0dcb4348bad

                                                        SHA1

                                                        aa8b96abd540f1df7b64ab01c237c0eb9bef7c3a

                                                        SHA256

                                                        955a73dba7a12ad968ce000a6f0ba0b3c9d144f1eea2e392e6ed86376f34ce74

                                                        SHA512

                                                        807e4eb0fb57c26cd4c95e073595f984dbbfbc49937062c6b9bc693381224fcc5be6b9e9d8c7954cc559b42bf83aa80d53b4cb59a9f83a1424f399f46ee33d5d

                                                      • C:\Users\Admin\AppData\Local\Temp\inteldriverupd1.sct
                                                        Filesize

                                                        432B

                                                        MD5

                                                        8decdcaeb92d9f628b6bf95de4c0597a

                                                        SHA1

                                                        19443ad64921ef01a77619350efcc97cd767a36b

                                                        SHA256

                                                        e4f6b9def338fe9aca9e8796e79c58c5e42168e697c41bfe149946513765036e

                                                        SHA512

                                                        d67fee80c9f4884331e476f53de7516d21e926cf2f00094bf310ccd6e875164740b31749ec1ea43c1015037590b9bfebe2bde0065d75e42343bfbd0c46bccf59

                                                      • C:\Users\Admin\AppData\Local\Temp\task.bat
                                                        Filesize

                                                        149B

                                                        MD5

                                                        c42b20e49a3b093e2d0c9d6b3051cfc7

                                                        SHA1

                                                        5fc1f968c7285c8b0c5f25e839e14d77df7e28f3

                                                        SHA256

                                                        83935da79d6a4dcfd28121b5c0dd01b40e66da125971ac49e65221efb91a65a6

                                                        SHA512

                                                        01881572adbe471797fd901057fabb1d631fc675dacd33c59876b9bb163deb1b9f8f82ed49c8a19bf69d871abe8e241beba8dcddc84ca4caf13ee4d4be9ac1fe

                                                      • memory/1132-55-0x00000000042C0000-0x0000000004373000-memory.dmp
                                                        Filesize

                                                        716KB

                                                      • memory/1656-0-0x000000002FDF1000-0x000000002FDF2000-memory.dmp
                                                        Filesize

                                                        4KB

                                                      • memory/1656-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
                                                        Filesize

                                                        64KB

                                                      • memory/1656-2-0x00000000716BD000-0x00000000716C8000-memory.dmp
                                                        Filesize

                                                        44KB

                                                      • memory/1656-42-0x00000000716BD000-0x00000000716C8000-memory.dmp
                                                        Filesize

                                                        44KB

                                                      • memory/2620-51-0x0000000000F40000-0x0000000000F4D000-memory.dmp
                                                        Filesize

                                                        52KB

                                                      • memory/2752-45-0x0000000000400000-0x000000000042A000-memory.dmp
                                                        Filesize

                                                        168KB

                                                      • memory/2752-49-0x0000000000400000-0x000000000042A000-memory.dmp
                                                        Filesize

                                                        168KB