Overview
overview
7Static
static
7e22cab6dd5...18.exe
windows7-x64
7e22cab6dd5...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3FM_Client.exe
windows7-x64
7FM_Client.exe
windows10-2004-x64
7Fts32.dll
windows7-x64
3Fts32.dll
windows10-2004-x64
3WhatsNew.rtf
windows7-x64
4WhatsNew.rtf
windows10-2004-x64
1fm_client.chm
windows7-x64
1fm_client.chm
windows10-2004-x64
1fm_client.exe
windows7-x64
7fm_client.exe
windows10-2004-x64
7Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 09:30
Behavioral task
behavioral1
Sample
e22cab6dd53b2cbba41ba9d1595836e3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e22cab6dd53b2cbba41ba9d1595836e3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
FM_Client.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
FM_Client.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Fts32.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Fts32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
WhatsNew.rtf
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
WhatsNew.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
fm_client.chm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
fm_client.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
fm_client.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
fm_client.exe
Resource
win10v2004-20240802-en
General
-
Target
fm_client.exe
-
Size
341KB
-
MD5
dd72809749cda5dfc6f8c6cc34116fe1
-
SHA1
7bedda259c173e14bdde9eb7e243f14fe6bd2ad2
-
SHA256
34d76572949133ee9f785d4f4a9862a7b2c2cbe2174b4adfb53198c4972a2fc9
-
SHA512
7e92b3bd1bf8b4b87b956a2e7d5dd858fdea3712d78af02f34b1629192df278ede81aef3845eec1ea4297a4639f32af8df772439bc339ebc3cb2953f008a32d3
-
SSDEEP
6144:oekd9k7xS2fNBO+WFhEbkwPXRf6rIiTyTF1AUtrlL1AGEotio6v8m:oTQVz70hekwZGGp1tth5tio6vd
Malware Config
Signatures
-
resource yara_rule behavioral13/memory/2876-0-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral13/memory/2876-52-0x0000000000400000-0x00000000004E2000-memory.dmp upx -
resource yara_rule behavioral13/memory/2316-46-0x0000000000400000-0x0000000001B78000-memory.dmp vmprotect behavioral13/memory/2316-47-0x0000000000400000-0x0000000001B78000-memory.dmp vmprotect behavioral13/memory/2316-48-0x0000000000400000-0x0000000001B78000-memory.dmp vmprotect behavioral13/memory/2316-49-0x0000000000400000-0x0000000001B78000-memory.dmp vmprotect behavioral13/memory/2316-50-0x0000000000400000-0x0000000001B78000-memory.dmp vmprotect behavioral13/memory/2316-83-0x0000000000400000-0x0000000001B78000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 fm_client.dll -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2316 fm_client.dll -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fm_client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fm_client.dll -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2316 fm_client.dll 2316 fm_client.dll -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2316 2876 fm_client.exe 29 PID 2876 wrote to memory of 2316 2876 fm_client.exe 29 PID 2876 wrote to memory of 2316 2876 fm_client.exe 29 PID 2876 wrote to memory of 2316 2876 fm_client.exe 29 PID 2316 wrote to memory of 2580 2316 fm_client.dll 30 PID 2316 wrote to memory of 2580 2316 fm_client.dll 30 PID 2316 wrote to memory of 2580 2316 fm_client.dll 30 PID 2316 wrote to memory of 2580 2316 fm_client.dll 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fm_client.exe"C:\Users\Admin\AppData\Local\Temp\fm_client.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\fm_client.dllC:\Users\Admin\AppData\Local\Temp\fm_client.dll -HWND=5246842⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD55887a7b9f02562b8ea84cc2edf8791ff
SHA1035166226628d56ea5868a6615e94592b02ed72e
SHA2566e49c61f3f27996e89357ac51b92ff3b760411f30e841ede96b2d13fc7e04e44
SHA512ca0fa8125ff6310b5ca30b8ed79a42f23c31fcf8b565a15f3a43b7513ed83bc8051f0796f9a7dce9012b03acec4d7d7c3ec77b59d378a93f759d376aad72ec5c
-
Filesize
8KB
MD5f8c52aecf6d22da1b5f37663c56634aa
SHA1fe3dbd9a5b5ef0421ddb26d57c5d76c53ff38a23
SHA2569b85b2b77b171588d31834f5e854e2be826aa9be594faff9a1a8da8d889f5f42
SHA51269159f20ece77794551170dc0e11a6647b2427829ea58ef9086dfed7a8207536049cdab67318c68eca07a1b56211b06c8742a1e817262322aea858d75d6216cc
-
Filesize
512B
MD5b48fe921c96ce8f34e44bb06ca81c98f
SHA15d01fa302372006db2fd9cf60a9b25901bb12cbc
SHA2560423e2964d0d99d7956178ec4fff1d8e15836e01a828f367a06c1c2e73a2e5e0
SHA512236a0d7eaf45dc1c09b474330fa390326a746c3f9551d4e0cd14e47c380a0573dcf1a3a4514f49b21911d70de4ea4e66901889367b95a609b573f50ab1af1886