Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6a02b032ec9f2ab8fd607270afb20b06143ad445d32fb2e3eb1ebf1fbccef951.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6a02b032ec9f2ab8fd607270afb20b06143ad445d32fb2e3eb1ebf1fbccef951.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/cwhxmitph.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/cwhxmitph.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/cwhxmitph.dll
-
Size
178KB
-
MD5
e168e018ae7b50b12ccbf621f92a8d80
-
SHA1
f58c9aca0a2d1f9598fab015124ce3b7b90b973e
-
SHA256
b13b4eef285efc06e845504a1daec9949d4182c34a9a1737e65c87eba4b04a7a
-
SHA512
8e4e3b74f4ce9b2a4569d291c23763c3785f3582c199c3be75f462cc4cc01733b287161310733d5cf8c6301cfe25bbc28ebefacb4b944d6acb19fd2f04219111
-
SSDEEP
3072:L5qpSYH/rb0G1zCObTntqxM5p4mLZAR8fWzP:6HeOHntqxM5Sm/QP
Malware Config
Extracted
formbook
4.1
h2b0
coastmortgageloans.com
sejt.xyz
krisandmeigeni.com
personalbias.com
cubana-pablo.com
nipahvax.com
cxyzjsrc.com
trttanks.com
yoko-by.com
sbyidn.net
metainstagram.faith
katsuyatoken.com
trustminingfx.trade
xsightvideos.online
localemergencies.com
2ab0.com
idahofloat.com
ourdogdream.com
thebestmediaguy.com
forthesaltysouls.com
ordinaryborrow.xyz
tarinalintu.net
thefomorprophecy.com
botpg.com
fistoffraggers.xyz
bancogmacsa.com
umoveebikes.com
facecapades.com
ativaragora.site
zaphysio.com
otl-logistik-gmbh.com
netpug.com
sheinfluenceschange.com
paddyscaddy.com
revtiredirect.com
quantumcapital.technology
themarketplace.digital
zfld1.com
superbstix.com
infoavatarslot88.com
9681627.com
gophastr.com
ashleighevan.com
unpeg.xyz
thepowerofdtk.com
realdolls.website
theahmadis.com
rejykio.site
dutrax.online
campusmoneytree.com
metanovibrand.design
weldonswestern.com
greywearimpex.com
francescabaldi.coach
eshaalgilliamslbui.com
klmywmux.com
chuangshihuoban.com
writesco.com
metawhatsapp.insure
portalzy.com
halloween-ready.com
haxable.com
bs-pipe.com
xxyipay.com
brocoser.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral3/memory/2604-1-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/2604-4-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/3028-10-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2348 set thread context of 2604 2348 rundll32.exe 30 PID 2604 set thread context of 1264 2604 rundll32.exe 20 PID 3028 set thread context of 1264 3028 chkdsk.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2604 rundll32.exe 2604 rundll32.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2604 rundll32.exe 2604 rundll32.exe 2604 rundll32.exe 3028 chkdsk.exe 3028 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2604 rundll32.exe Token: SeDebugPrivilege 3028 chkdsk.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2348 2200 rundll32.exe 29 PID 2200 wrote to memory of 2348 2200 rundll32.exe 29 PID 2200 wrote to memory of 2348 2200 rundll32.exe 29 PID 2200 wrote to memory of 2348 2200 rundll32.exe 29 PID 2200 wrote to memory of 2348 2200 rundll32.exe 29 PID 2200 wrote to memory of 2348 2200 rundll32.exe 29 PID 2200 wrote to memory of 2348 2200 rundll32.exe 29 PID 2348 wrote to memory of 2604 2348 rundll32.exe 30 PID 2348 wrote to memory of 2604 2348 rundll32.exe 30 PID 2348 wrote to memory of 2604 2348 rundll32.exe 30 PID 2348 wrote to memory of 2604 2348 rundll32.exe 30 PID 2348 wrote to memory of 2604 2348 rundll32.exe 30 PID 2348 wrote to memory of 2604 2348 rundll32.exe 30 PID 2348 wrote to memory of 2604 2348 rundll32.exe 30 PID 2348 wrote to memory of 2604 2348 rundll32.exe 30 PID 2348 wrote to memory of 2604 2348 rundll32.exe 30 PID 2348 wrote to memory of 2604 2348 rundll32.exe 30 PID 1264 wrote to memory of 3028 1264 Explorer.EXE 31 PID 1264 wrote to memory of 3028 1264 Explorer.EXE 31 PID 1264 wrote to memory of 3028 1264 Explorer.EXE 31 PID 1264 wrote to memory of 3028 1264 Explorer.EXE 31 PID 3028 wrote to memory of 2236 3028 chkdsk.exe 32 PID 3028 wrote to memory of 2236 3028 chkdsk.exe 32 PID 3028 wrote to memory of 2236 3028 chkdsk.exe 32 PID 3028 wrote to memory of 2236 3028 chkdsk.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\cwhxmitph.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\cwhxmitph.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\cwhxmitph.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2236
-
-