Overview
overview
3Static
static
36524032e72...18.exe
windows7-x64
36524032e72...18.exe
windows10-2004-x64
3$PLUGINSDI...up.exe
windows7-x64
3$PLUGINSDI...up.exe
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$R1.exe
windows7-x64
$R1.exe
windows10-2004-x64
$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
1$PLUGINSDI...ss.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDIR/nswg.dll
windows7-x64
3$PLUGINSDIR/nswg.dll
windows10-2004-x64
3$PLUGINSDI...e.html
windows7-x64
1$PLUGINSDI...e.html
windows10-2004-x64
1$PLUGINSDI...w.html
windows7-x64
1$PLUGINSDI...w.html
windows10-2004-x64
1Analysis
-
max time kernel
110s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
6524032e725ee9b038fa27931fd71c6e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6524032e725ee9b038fa27931fd71c6e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FLVProPlayerSetup.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FLVProPlayerSetup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$R1.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$R1.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InetLoadEx.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InetLoadEx.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/Progress.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/Progress.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nswg.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nswg.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/welcomepage.html
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/welcomepage.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/welcomepage_noadw.html
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/welcomepage_noadw.html
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/welcomepage.html
-
Size
5KB
-
MD5
4df1fdae99a99c7a202e889dbd41d33f
-
SHA1
0bef5beda262ac4c011826ef65ef65d1dda5f5c5
-
SHA256
f5792ef5d085448c3aedb3a5338c1599372bbbdd18012c00ef36f198fc910fe8
-
SHA512
6471a002a1215f4c74dfb9d3e75815a21d0cefde0f25c1223a8cf7a70cb0edbccf8be54f08008a88a13877987fe29f855bd9b6bcb2fc22b355acb57176eff87a
-
SSDEEP
96:SI32bJiWEMkTSf7qOugnffDbhIDbbE5zDbnwEqqc/zIxG1DuspXqN35yN64WVAPt:SI0iWEM6Sf75ugffDtIDHEBDzwfF//4M
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{672404B1-4886-11EF-B99E-46A49AEEEEC8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000aa3750ab30ce39511664e55adffbd4821f737f1953b80f2e8aa4b6e1b130909e000000000e800000000200002000000025bc50e4e1f6e76494319454f712c8bc1c5eb24f6a0999d728fe932b44f44ec42000000032d4a6d62a0e03cd53e8cec07260d9475fae5d21ed2db8f39867ce75bab02eae40000000bd4ee52629283195ff7a5855c6fe98c0c72d3307c15949be9b6300cd4e7a8e82c734a3e9dcb764391ba133000d642529efc30f60784a9fb46839cc0d02da6dd9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427854667" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0fd6c3c93dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1996 iexplore.exe 1996 iexplore.exe 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1184 1996 iexplore.exe 29 PID 1996 wrote to memory of 1184 1996 iexplore.exe 29 PID 1996 wrote to memory of 1184 1996 iexplore.exe 29 PID 1996 wrote to memory of 1184 1996 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\welcomepage.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5060590c5886305d6b9899992cb67e16b
SHA175e459b9926e3f0a47e5367c0d43dbf3575152b4
SHA256d5803977c04bf48a9a001cb7d27fda70686fdd1f5c8bd6673c190110d6dad3ba
SHA512537081234a5ca8475736dc524fe6a0cd5981599ca8bdb46a6f084090cf4132e7196bf0d192001ad3b867bbf3206cd8db1d43299cf0313698cb4427ce09c3ead3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acad1a322bef6ab6d5be8a88dc158dc4
SHA1a2b05470217bfdaaeb62c68a0f1d84f8342dc748
SHA256b6738aa368c2fc14663f60593af49da3f2f741b8f9c892f9d98e7d7f384555ff
SHA512341062cdc7b0e00863581b6782003a9764ec6dc8ebdcf5a023ade723bde0b1260e09a7a5b84156f090ca5d407f771ed8553ddad647e5aed87ed6328c57a45523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553eda1f0ec99145b46cfdd1e9dc7c126
SHA1bd1ae5e0eb19380105aeda17c23e8097882aa403
SHA256ba81f0674f7d72cad45d7ff7882cbca0c3183726ba77c6436734f59a28172499
SHA512746827aef0516c5e702fe1dc583264f20a52e7d0fcfc89cab6d291df99fb262fd101bb1c0ef701a47cb320047a5aac87987b6d2d2fc3e25cdcdec0028afb2e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b2e41226dde68b031969b4841c45282
SHA1785a6056c926e7f2b0f4764064a9598860bdd010
SHA25640d8ba45c28186a2e8e11a875e57c010cd0c759fc7f294f15450d9ecac67ed06
SHA5123c8609c359601a2150f39e6000ea3a1501c1b7d4b40475093eb71e0b7e3f837228407f930e8e4194389b05c7c24bd479addbdabe219367359934f51826477599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba32235dce785a84691a5ba32253e28
SHA10ce08ba64582ba18878be1bfea8782a5837e4f1e
SHA256e50f72caec093418ac2990a780eb1ed3bf6b7fd614bb24baad40e2a92a4cdf1b
SHA512c88c3428a5a55af3195c9881a9d7bdb778ca567f2ff575a8f3eda03947a2213d625fc8205286a4d5d3545c156f0123f46cf99a7af8592bd29d4901c4a7357fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a202bd90772081af9c680d6d79d87d18
SHA1c5e88a3451d9d0105e60f264a847a00702aea98f
SHA2565514a43189dc26f6241673ff96c8b92148704b61ea50b8d173114a93f6b6148e
SHA5122e2ec718e176405f41ecf228a7a4fff3446cc230228695c5d4d4b017a0c1fd1689182b7d6eab52df2ecf2734dff7d2c88782fb1680c8a6e87e5c6181c3b95626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f11ff792ad2422fb8704ef83d3a9b437
SHA15440901128c13587623a8e7e028a51424e8778f0
SHA256e9dc316379ba111cd091fd50b36b915bf7e693e64195e656b626e06e88dcde5d
SHA5124987548c8047b10f40593527bc36be1e4ff776e146b19f4ebc26f6b1f3e5a7425317530833cfffbc68603fd256891d184f68b5d4512805d0490180ed29da868f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eae62f31d900c32ca8006ac6d480f47
SHA1b708897955875e04af832fbce24a67e7211b46eb
SHA2562e4e4d649c6a27b8310bb989dce981c11567eb24f26636608c70c595df2b294f
SHA5124f8e13bc6958b6f91ee38c36be233edb592489d9669b366fe8ca21694c9062e4ea3cfec4b0ea621654eb4d3db105b01926c2dfb864c799685f521e533e23095f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef7f62eefab146ead8d49be73b157087
SHA1a23579c4f84eeb93e05a39b3011be160389c8260
SHA256c2ebf76749b32c76c56bb336fd5b929a7cfdb9a1f68a363eb6aa20973bb7f86d
SHA512e819fa67cbe5bb1fbfbbee0a76f1105fcd6202822e021df3dcd89f22560fea956e5ff5cd3ad586543543e5e0645df464cd9549bf3ead0e00d846b3d7346f2b97
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b