Overview
overview
10Static
static
772f633f58d...18.exe
windows7-x64
1072f633f58d...18.exe
windows10-2004-x64
10$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...nd.dll
windows7-x64
10$PLUGINSDI...nd.dll
windows10-2004-x64
10$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
10$PLUGINSDI...em.dll
windows10-2004-x64
10$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
10$PLUGINSDI...om.dll
windows10-2004-x64
10$PLUGINSDIR/xml.dll
windows7-x64
10$PLUGINSDIR/xml.dll
windows10-2004-x64
10$TEMP/$_89...in.dll
windows7-x64
10$TEMP/$_89...in.dll
windows10-2004-x64
10OpenAL32.dll
windows7-x64
10OpenAL32.dll
windows10-2004-x64
10SDL.dll
windows7-x64
1SDL.dll
windows10-2004-x64
1cg.dll
windows7-x64
10cg.dll
windows10-2004-x64
10cgGL.dll
windows7-x64
10cgGL.dll
windows10-2004-x64
10glew32.dll
windows7-x64
3glew32.dll
windows10-2004-x64
3protozoa.exe
windows7-x64
10protozoa.exe
windows10-2004-x64
10Analysis
-
max time kernel
129s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 19:09
Behavioral task
behavioral1
Sample
72f633f58d227097bfdecfe376d43a33_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72f633f58d227097bfdecfe376d43a33_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/MyNsisExtend.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/MyNsisExtend.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/locate.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/locate.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$TEMP/$_89_/MyNsisSkin.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$TEMP/$_89_/MyNsisSkin.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
OpenAL32.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
OpenAL32.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
SDL.dll
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
SDL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
cg.dll
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
cg.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
cgGL.dll
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
cgGL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
glew32.dll
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
glew32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
protozoa.exe
Resource
win7-20240221-en
General
-
Target
protozoa.exe
-
Size
446KB
-
MD5
e2483e0fbce7217101ba1e0cb49026c1
-
SHA1
62788e0e7c29811c87bcd636ad12c3f8db1d81b3
-
SHA256
2e8a4183f3340095e2aa0988d9c4c99d4fc724d21b36ae947797a16116187131
-
SHA512
88b8bac88b89ac494ad88ffd88abfce11a738021a15a30600850c9c0b5ebed1c3c78806cf0f9d6204d6afc5c6990b24fa876fa1e7270bc20db040c7eeda05c70
-
SSDEEP
6144:gVHYucgQtyqGplPZCragI0eG2IQ8CN99tPRsTPePBZva6KIaV7FqFPK/QXPj7QRx:gVY3yxCrab0H68g7SqBa97mUG1NT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
protozoaSrv.exeDesktopLayer.exepid process 1056 protozoaSrv.exe 4224 DesktopLayer.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\protozoaSrv.exe upx behavioral32/memory/1056-16-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral32/memory/4224-19-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
protozoaSrv.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe protozoaSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\px5043.tmp protozoaSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe protozoaSrv.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "963923929" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31108823" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{645281BC-1ACA-11EF-B826-F2DE30E55115} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "958926715" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31108823" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31108823" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423429179" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "958926715" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
DesktopLayer.exepid process 4224 DesktopLayer.exe 4224 DesktopLayer.exe 4224 DesktopLayer.exe 4224 DesktopLayer.exe 4224 DesktopLayer.exe 4224 DesktopLayer.exe 4224 DesktopLayer.exe 4224 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
protozoa.exeiexplore.exeIEXPLORE.EXEpid process 3620 protozoa.exe 2112 iexplore.exe 2112 iexplore.exe 3332 IEXPLORE.EXE 3332 IEXPLORE.EXE 3332 IEXPLORE.EXE 3332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
protozoa.exeprotozoaSrv.exeDesktopLayer.exeiexplore.exedescription pid process target process PID 3620 wrote to memory of 1056 3620 protozoa.exe protozoaSrv.exe PID 3620 wrote to memory of 1056 3620 protozoa.exe protozoaSrv.exe PID 3620 wrote to memory of 1056 3620 protozoa.exe protozoaSrv.exe PID 1056 wrote to memory of 4224 1056 protozoaSrv.exe DesktopLayer.exe PID 1056 wrote to memory of 4224 1056 protozoaSrv.exe DesktopLayer.exe PID 1056 wrote to memory of 4224 1056 protozoaSrv.exe DesktopLayer.exe PID 4224 wrote to memory of 2112 4224 DesktopLayer.exe iexplore.exe PID 4224 wrote to memory of 2112 4224 DesktopLayer.exe iexplore.exe PID 2112 wrote to memory of 3332 2112 iexplore.exe IEXPLORE.EXE PID 2112 wrote to memory of 3332 2112 iexplore.exe IEXPLORE.EXE PID 2112 wrote to memory of 3332 2112 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\protozoa.exe"C:\Users\Admin\AppData\Local\Temp\protozoa.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\protozoaSrv.exeC:\Users\Admin\AppData\Local\Temp\protozoaSrv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3332
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5c41ab5352ba79baac9ac093dd7eb2500
SHA11ffb0e70f86845daba211aeda43cad539d34ffd3
SHA256558e13bb7aa293569457e9703d2db37e8365e2ab670b2c3484ada9336ed24895
SHA512ccebe3f11039e14d39d4102652669fd372d179778bf73fae0659dd01da569bbf850b273cd3a4e13dc77b3fd4fb4d84d01525ac3a0dcb23b297c733da10bc2ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD53ff775e6bba96851a7896d10316d6bd4
SHA14de375d893f2126b687963bbfa28da2805c36007
SHA256253bb2b72e193f32dc3ca4b2460f411441656072f07af7f34144edd89af7fa5f
SHA512b913cec17c9656b8c4559f23404676fb1963cd2cca8bd5e85dc2551fefd3ed5c930261ca0d6c2ea7d8f80956fa83acbd64a74b64d8b7942338a3dc32b47d5cab
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a