Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
c9ccade124b44534d0ff46033c9262f6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c9ccade124b44534d0ff46033c9262f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/mfhecv.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/mfhecv.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/mfhecv.dll
-
Size
30KB
-
MD5
e97a552be97bf8ca0cd083250ef8b343
-
SHA1
8283294c2b23684bf1aa6bdc7729ef80efcf7673
-
SHA256
7ae5225917f9eb18e030e2aad1c0b9f7a3fc5789986e9222281cb3663d5f0775
-
SHA512
0f9f53254f11ee2f3cf757ba5459c8380bd07872cbb12a5dc0a681f978e5c10eb136bca57de593adbd806980d1484896a47ab4eaab1794c98113b80992e9a07a
-
SSDEEP
768:AYYsBQJDh7wN4Ce1k95WuPO8P9se1wcEWTF9D8E:AoBQJD6LPO8P9fwcE0qE
Malware Config
Extracted
formbook
4.1
s3dy
ravlygte.info
marketnewsville.online
flooring-envy.com
flavourhouston.com
donghohanghieunam.com
globleitsolutions.com
digitalgraphicarts.com
cupidbeautybar.com
cannavybes.com
negative-dsp.com
littledali.com
meltwatersoftware.info
blackdogland.com
danasales.com
mississippiscorecard.com
mainesmoker.com
sirenxinlilzixun.com
tychehang.com
gentciu.com
weckloltd.com
posy-socks.com
smp2kroya.com
clientacceleratorchallenge.com
erlacollection.com
027tvs.com
thisdw.com
nonosmell-store.site
underadress.com
principal.properties
ministyles123.com
readtohappiness.com
roostercollection.com
veteransinfrastructureparks.com
theminiverse.com
auto-expresss.club
ciaokitchenandbath.com
sbsfresh.com
onesheart111.com
artofquiet.info
atecwtec.com
scars-finder.online
luckbaanasset.com
vegaguzmanstudio.com
destinedtowander.com
genesaloe.info
shirewindowcleaning.com
dwadawdf001.com
mividaurbana.com
outsiders.house
secondhandcare.club
1031exchangeintoreit.com
zenyoustore.com
bahissikayetvar.net
platforms.trade
dasmusstduhaben.com
frankplex.design
thesiblingsoiree.com
18sdsd.com
oneninelacrosse.com
hdsllawfirm.com
rawrequest.com
jetsetterlifestyle.luxury
karenmendell.com
aspydad.com
livelifevibrantcourse.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral3/memory/2888-1-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral3/memory/2888-5-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2864 set thread context of 2888 2864 rundll32.exe 31 PID 2888 set thread context of 1208 2888 rundll32.exe 21 PID 2424 set thread context of 1208 2424 help.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2888 rundll32.exe 2888 rundll32.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe 2424 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2888 rundll32.exe 2888 rundll32.exe 2888 rundll32.exe 2424 help.exe 2424 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2888 rundll32.exe Token: SeDebugPrivilege 2424 help.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2864 2756 rundll32.exe 30 PID 2756 wrote to memory of 2864 2756 rundll32.exe 30 PID 2756 wrote to memory of 2864 2756 rundll32.exe 30 PID 2756 wrote to memory of 2864 2756 rundll32.exe 30 PID 2756 wrote to memory of 2864 2756 rundll32.exe 30 PID 2756 wrote to memory of 2864 2756 rundll32.exe 30 PID 2756 wrote to memory of 2864 2756 rundll32.exe 30 PID 2864 wrote to memory of 2888 2864 rundll32.exe 31 PID 2864 wrote to memory of 2888 2864 rundll32.exe 31 PID 2864 wrote to memory of 2888 2864 rundll32.exe 31 PID 2864 wrote to memory of 2888 2864 rundll32.exe 31 PID 2864 wrote to memory of 2888 2864 rundll32.exe 31 PID 2864 wrote to memory of 2888 2864 rundll32.exe 31 PID 2864 wrote to memory of 2888 2864 rundll32.exe 31 PID 2864 wrote to memory of 2888 2864 rundll32.exe 31 PID 2864 wrote to memory of 2888 2864 rundll32.exe 31 PID 2864 wrote to memory of 2888 2864 rundll32.exe 31 PID 1208 wrote to memory of 2424 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2424 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2424 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2424 1208 Explorer.EXE 32 PID 2424 wrote to memory of 3064 2424 help.exe 33 PID 2424 wrote to memory of 3064 2424 help.exe 33 PID 2424 wrote to memory of 3064 2424 help.exe 33 PID 2424 wrote to memory of 3064 2424 help.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mfhecv.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mfhecv.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mfhecv.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-