Overview
overview
10Static
static
3b5acd71148...18.exe
windows7-x64
10b5acd71148...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3FancyZoom.js
windows7-x64
3FancyZoom.js
windows10-2004-x64
3about.html
windows7-x64
1about.html
windows10-2004-x64
1blogid=321...4.html
windows7-x64
1blogid=321...4.html
windows10-2004-x64
1contact-us.js
windows7-x64
3contact-us.js
windows10-2004-x64
3de.html
windows7-x64
1de.html
windows10-2004-x64
1jquery.meanmenu.js
windows7-x64
3jquery.meanmenu.js
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 23:10
Static task
static1
Behavioral task
behavioral1
Sample
b5acd7114871b64c25d2eaadbce860f6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5acd7114871b64c25d2eaadbce860f6_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
FancyZoom.js
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
FancyZoom.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
about.html
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
about.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
blogid=321536463764.html
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
blogid=321536463764.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
contact-us.js
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
contact-us.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
de.html
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
de.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
jquery.meanmenu.js
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
jquery.meanmenu.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
uninstall.exe
Resource
win10v2004-20240611-en
General
-
Target
de.html
-
Size
24KB
-
MD5
abce3b4a9941d130bb03ac8887d67b3b
-
SHA1
d620b463362c34056684999db12b2e6909cc68ee
-
SHA256
b78e03382bf79dbcda1a14c3af14a70973fab9dd39e1f60bcba45d01f6819e83
-
SHA512
035fbf096e11497b9a749361d0d0394cd2ac19234c78298ce54b51ebcc9ad18a991030a49144973e5e987923ff20fa3b16131c5cda9d147c43dd04530ca555cb
-
SSDEEP
384:Uyl3pt9zhen4kwXCpy7WycDMyfokoF7uYESuz0N+Ll3D+:UGt9zE4kGyyaycD3fovFddBNCT+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424741350" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000003f91b986b2dc2458f7119a2aa70ddb1a13d38700c3a60e0941441bc4ee528fc3000000000e8000000002000020000000f8ec4faa88eda4d3bee2298be1727ce1aaae5aea52de7135203da9cdc9eb3fd52000000023375904a2cab395d5694ad01815dab2b7a16bbf011f3f4736fb2aeeab8f0f7240000000742244b19d6eb45ed5492386e0f9258124430c1c57965e2b03187fa55b86159569714e8797dd7a059ce19933c44dc65a1a85c1bfea5dcd81fcd5b4720b164b75 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05bef9442c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B20B5271-2C35-11EF-B27B-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2644 1900 iexplore.exe 28 PID 1900 wrote to memory of 2644 1900 iexplore.exe 28 PID 1900 wrote to memory of 2644 1900 iexplore.exe 28 PID 1900 wrote to memory of 2644 1900 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-