Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 11:15
Behavioral task
behavioral1
Sample
8e8730c2364104924ba2d6b982716faf_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
8e8730c2364104924ba2d6b982716faf_JaffaCakes118.exe
-
Size
313KB
-
MD5
8e8730c2364104924ba2d6b982716faf
-
SHA1
55e4693e1cd861f349a9e9bea58b7d6a102c5eee
-
SHA256
d280ba8a00ed6d17a243396d2e9d64a3a1b44667dfafa6de8aba5d93c8150340
-
SHA512
decb40146288b9d06c070fd0f98fe1b05a48b36f726d7e6da068f134ad68339321fbf85ac3c951a9bdaaaeb7e9a3bd24aa4e6fef934d973203ed68faeadd8318
-
SSDEEP
6144:tVYmoP2D+6u6e1t0pUVnxNwDwIj9o9sy7aNC5asej5zYQou0MiJ/A0aufAKSN7bP:H2Pn6uN/0pU5XwDNox7aNo4OJ9pfAKCP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 8e8730c2364104924ba2d6b982716faf_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation installation.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 4564 synertel_ie.exe 1896 installation.exe 4832 Instal.exe -
resource yara_rule behavioral2/memory/1336-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x000700000002341b-12.dat upx behavioral2/memory/1896-13-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/1896-32-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/1336-39-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\minftnet.exe Instal.exe File opened for modification C:\Program Files\Internet Explorer\minftnet.exe Instal.exe File created C:\Program Files\Internet Explorer\minftnet.ini Instal.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Instal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e8730c2364104924ba2d6b982716faf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language synertel_ie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\YouGoo\DisplayName = "YouGoo" synertel_ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "YouGoo" synertel_ie.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTSR" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\User Preferences iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "74112225" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "http://www.bing.com/favicon.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31124649" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "76925114" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31124649" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IESR02" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTSuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&market={language}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IENTSS" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "Bing" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\YouGoo synertel_ie.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ShowSearchSuggestions = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\User Preferences\2BB20B33B4171CDAAB6469225AE6A582ED33D7B488 = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb000000000200000000001066000000010000200000007310c60bfba88e894befcebc41419979bcafd9fbd04cb4ac3f6d886e9495c9ba000000000e80000000020000200000002141178ed587bd0339935583fc4283ccd2796dd7fae5c7b7879e0c2c9e432eb210000000367c346ff107e1b9558151ce06f530804000000093bc45cbc1ecc2aea32e205891a42de5fa2358814b48e8ca58cd07da0199967b81ecf8aedf7fbbcd5333ffc0ff3517436fbe922bfe9c18656f64addd960b9c33 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb000000000200000000001066000000010000200000002d59a94ba36d6cb28ab8084379c8784e9ffadc46b9b429253c3875bc1c4ab8c3000000000e8000000002000020000000a23bf57ab37dbaa7dff808ae742efef07f8d5adcfd3f6b66f8e244a5b08e1031200000002ac9503763512cff271c3a5b2b8fdebc7541d34eca66b561f943edba7e0ce17e400000007638cdb98fb86fdafb3482b3b835712a262bffbc75696f62c2290a84d910a05703d34bdd06f8ecc5fa4f784191a3953ba3b95405c79da5adf2c23e40233c9c88 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ef9b15a9ecda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31124649" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "74112225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTTopResultURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTTR" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\YouGoo\URL = "http://www.yougoo.fr/meteo?search&q={searchTerms}" synertel_ie.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{30087840-589C-11EF-BFD9-FA03B01A99D1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURL = "http://www.bing.com/favicon.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{0633EE93-D776-472f-A0FF-E1416B8B2E3A}" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70349715a9ecda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430226306" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000682ef1adb6c1b741b9a6296375b8eefb000000000200000000001066000000010000200000001c69ebe4c85bcfed30a91f6db7e4046103f913bf6f282ab75d8f1488f7bafc71000000000e8000000002000020000000ff340ea9841da734c111fa05ac9f83f28cfaa11a8975f0374fcab95979f2b4e020000000b874dc0410a2e3bb5481f5fd6fafd9db1704adf4ebd6ca195e56bf7862bbd8d34000000019773c499c714b4bed5e21cc7f75223948115a95fc040cc8184a1e845896025ce8a86077dbc099f3f02abdd4fbb2d61991eaf628cbd7a9f2f41cad6466d3d7ba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main synertel_ie.exe Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Secondary Start Pages = 0000 synertel_ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTLogoPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.yougoo.fr/meteo" synertel_ie.exe -
Modifies registry class 17 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.vtx\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f} synertel_ie.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\vtxfile\EditFlags = 00000100 Instal.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.vtx synertel_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-minitel Instal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vtx\ = "vtxfile" Instal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vtxfile\Shell\open\command Instal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vtxfile\Shell\open\command\ = "C:\\Program Files\\Internet Explorer\\minftnet.exe %1" Instal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vtx Instal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vtx\Content Type = "vtxfile" Instal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vtxfile Instal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vtxfile\AlwaysShowExt Instal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vtxfile\Shell Instal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vtxfile\Shell\open Instal.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.vtx\shellex\{00021500-0000-0000-C000-000000000046} synertel_ie.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.vtx\shellex synertel_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-minitel\Extension = ".vtx" Instal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vtxfile\ = "Win-Minitel" Instal.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 456 iexplore.exe 456 iexplore.exe 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1336 wrote to memory of 4564 1336 8e8730c2364104924ba2d6b982716faf_JaffaCakes118.exe 86 PID 1336 wrote to memory of 4564 1336 8e8730c2364104924ba2d6b982716faf_JaffaCakes118.exe 86 PID 1336 wrote to memory of 4564 1336 8e8730c2364104924ba2d6b982716faf_JaffaCakes118.exe 86 PID 4564 wrote to memory of 2340 4564 synertel_ie.exe 89 PID 4564 wrote to memory of 2340 4564 synertel_ie.exe 89 PID 4564 wrote to memory of 2340 4564 synertel_ie.exe 89 PID 2340 wrote to memory of 1896 2340 cmd.exe 90 PID 2340 wrote to memory of 1896 2340 cmd.exe 90 PID 2340 wrote to memory of 1896 2340 cmd.exe 90 PID 1896 wrote to memory of 4832 1896 installation.exe 91 PID 1896 wrote to memory of 4832 1896 installation.exe 91 PID 1896 wrote to memory of 4832 1896 installation.exe 91 PID 4564 wrote to memory of 4920 4564 synertel_ie.exe 92 PID 4564 wrote to memory of 4920 4564 synertel_ie.exe 92 PID 4564 wrote to memory of 4920 4564 synertel_ie.exe 92 PID 4920 wrote to memory of 456 4920 cmd.exe 93 PID 4920 wrote to memory of 456 4920 cmd.exe 93 PID 456 wrote to memory of 1976 456 iexplore.exe 95 PID 456 wrote to memory of 1976 456 iexplore.exe 95 PID 456 wrote to memory of 1976 456 iexplore.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e8730c2364104924ba2d6b982716faf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e8730c2364104924ba2d6b982716faf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\synertel_ie.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\synertel_ie.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\installation.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\installation.exeC:\Users\Admin\AppData\Local\Temp\installation.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Instal.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Instal.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4832
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start /MAX iexplore http://www.info-meteo.fr/consultation3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.info-meteo.fr/consultation4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:456 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1976
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
293KB
MD56767fc71af403f073f5a0d63051c9fba
SHA1c3cc9b870effa6bdc18f1038463953e1dc1b9902
SHA256a5876a6066bbd8857e40c0a65bcffe2c06808888a67b88dc5e2f0ea7c43dca10
SHA51278c274da17db9b1016f2acc88a19dfa1d5d54087fb2837da6c6ce400bb1d49b3ce454bac407f553b361abb206b9c8ab9ae9ed0f0533e0626743dbb3878e4e1ae
-
Filesize
93KB
MD55442d6ddad3dda7c4a423efb2934eba4
SHA1f9016450ba16228f2b72234916672efb2b8312cb
SHA2562282378dc63c33457159768ccf9437202ad0b0c7e2ded02779a904fba560ad82
SHA512402c8688cd1561b59d086097db041fa521ec90412e3afeaa48d0efc42212f06c22301c243b2a77c3d1aac4dc0060f49debb569af79146fdd0ecee0c9b3870279
-
Filesize
440KB
MD56e8ba8f26baaf33c2f0fde5df60158a0
SHA1f39f84e9fa6379455b09159df0323838542521b5
SHA256dca424ef7ec3179cec5f1f2056ef6ef16ea334d26ff90b756791f236e2b6bc56
SHA512c0617589ab3ad68a820e259cbe694210c703ab4bf86730a243dc6b6e57bdcc3caf701bea28ecc985a3c049a3e0baf9ed72e036b6925f592ef735e7949e83b723
-
Filesize
230B
MD5db5212624e596fc960667f10d2d76015
SHA1b7354458dd53c7c6243859677c59f555fdfc98f5
SHA25663b4d50343f47d9344494b5a010d8fa4dc9525e9c73c12de693efd2be26abc0f
SHA512f04ae21868c877594471c839e2bd2b94146dd82cc935daa86625a81907ad51ba84ac5739b20dd7f59bf3c569e14f79199c0d26ddffeeee682ee6c3c7c64342c0
-
Filesize
243KB
MD589caeb802f93f13f711e393f2e857f17
SHA1ba7ffe0ceee84d333abbd3b2918a88ebea72dedf
SHA2566742be45f17b58762253ea1a86fdc9874130d3367f668e5be40c70a7aec1a1a6
SHA5125ca8de7804eb44caf461c5574c2984128e82d1fd6db2cfcaccfaf942e90fa49cac5c8ed34ef6c0e626cbc37c69583b61d768bb5a151c4c6386717a50d8b11877