Analysis

  • max time kernel
    148s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-06-2024 09:56

General

  • Target

    bb53429c934474eb4ae15362b0b0fed9_JaffaCakes118.exe

  • Size

    745KB

  • MD5

    bb53429c934474eb4ae15362b0b0fed9

  • SHA1

    88339aea119d80c639e1e98483936a8ca92e7fce

  • SHA256

    0497ec7bb66f401d56abc2f7d3aec12a4ca977d9ef122513a0781119a949b248

  • SHA512

    5b24c177f0e252547475258d5caa5dfbf58d16d3de48224d00bca0b3edee9b5d505d33c24c58a0a86dc5832425b26431f9145967ca9ddf53a116cf7a9915cffa

  • SSDEEP

    12288:uPq7y8gnl7DlLgY+/HY0nwNtA8utQyoHGaoe6Xk0eXhMMWTIMjdW3rYgbFT/c:cqO7LgYsVw3DlyGiQOVIM5W3kg5T/

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

hx251

Decoy

cttexpresso707870.site

get-motivation.com

0473.ink

tooniker.com

mediacionelite.com

barterdeck.com

revergereview.com

dafaok66.com

nukonu51.win

hotelesnemocon.com

edijsbogomolovs.com

businesoint.com

bsxdq.com

emanuelhospice.com

marlyprojects.com

jsmw297.com

alexandra-wehner.com

detroitpropertymanagment.com

xhtd293.com

uuluav19.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Users\Admin\AppData\Local\Temp\bb53429c934474eb4ae15362b0b0fed9_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\bb53429c934474eb4ae15362b0b0fed9_JaffaCakes118.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4492
      • C:\Windows\SysWOW64\cmd.exe
        "cmd"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3708
        • C:\Users\Admin\Desktop\bbbbbt.exe
          "C:\Users\Admin\Desktop\bbbbbt.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4340
          • C:\Windows\SysWOW64\cmd.exe
            "cmd"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2976
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "bbbbbt" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\bbbbbt.txt" | cmd"
              6⤵
              • Adds Run key to start application
              PID:660
          • C:\Users\Admin\Desktop\bbbbbt.exe
            "C:\Users\Admin\Desktop\bbbbbt.exe"
            5⤵
            • Executes dropped EXE
            PID:1176
          • C:\Users\Admin\Desktop\bbbbbt.exe
            "C:\Users\Admin\Desktop\bbbbbt.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:3952
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\Desktop\bbbbbt.exe"
        3⤵
          PID:5044

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\bbbbbt.exe
      Filesize

      745KB

      MD5

      bb53429c934474eb4ae15362b0b0fed9

      SHA1

      88339aea119d80c639e1e98483936a8ca92e7fce

      SHA256

      0497ec7bb66f401d56abc2f7d3aec12a4ca977d9ef122513a0781119a949b248

      SHA512

      5b24c177f0e252547475258d5caa5dfbf58d16d3de48224d00bca0b3edee9b5d505d33c24c58a0a86dc5832425b26431f9145967ca9ddf53a116cf7a9915cffa

    • memory/1468-23-0x0000000000E30000-0x0000000000E37000-memory.dmp
      Filesize

      28KB

    • memory/1468-24-0x0000000000E30000-0x0000000000E37000-memory.dmp
      Filesize

      28KB

    • memory/3404-22-0x00000000028F0000-0x00000000029DC000-memory.dmp
      Filesize

      944KB

    • memory/3404-29-0x0000000008B00000-0x0000000008C57000-memory.dmp
      Filesize

      1.3MB

    • memory/3404-27-0x00000000028F0000-0x00000000029DC000-memory.dmp
      Filesize

      944KB

    • memory/3952-21-0x0000000000D90000-0x0000000000DA4000-memory.dmp
      Filesize

      80KB

    • memory/3952-14-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/3952-18-0x0000000001090000-0x00000000013DA000-memory.dmp
      Filesize

      3.3MB

    • memory/3952-20-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/4340-10-0x00000000749F0000-0x0000000074FA1000-memory.dmp
      Filesize

      5.7MB

    • memory/4340-17-0x00000000749F0000-0x0000000074FA1000-memory.dmp
      Filesize

      5.7MB

    • memory/4340-11-0x00000000749F0000-0x0000000074FA1000-memory.dmp
      Filesize

      5.7MB

    • memory/4340-8-0x00000000749F0000-0x0000000074FA1000-memory.dmp
      Filesize

      5.7MB

    • memory/4492-0-0x00000000749F2000-0x00000000749F3000-memory.dmp
      Filesize

      4KB

    • memory/4492-9-0x00000000749F0000-0x0000000074FA1000-memory.dmp
      Filesize

      5.7MB

    • memory/4492-2-0x00000000749F0000-0x0000000074FA1000-memory.dmp
      Filesize

      5.7MB

    • memory/4492-1-0x00000000749F0000-0x0000000074FA1000-memory.dmp
      Filesize

      5.7MB