Overview
overview
3Static
static
395d7253a90...18.exe
windows7-x64
395d7253a90...18.exe
windows10-2004-x64
3$APPDATA/I...er.lnk
windows7-x64
3$APPDATA/I...er.lnk
windows10-2004-x64
3$DESKTOP/I...er.lnk
windows7-x64
3$DESKTOP/I...er.lnk
windows10-2004-x64
3$DESKTOP/�...Ʒ.lnk
windows7-x64
3$DESKTOP/�...Ʒ.lnk
windows10-2004-x64
3$FAVORITES...��.lnk
windows7-x64
3$FAVORITES...��.lnk
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SMPROGRAM...er.lnk
windows7-x64
3$SMPROGRAM...er.lnk
windows10-2004-x64
3$SMPROGRAM...��.lnk
windows7-x64
3$SMPROGRAM...��.lnk
windows10-2004-x64
3$STARTMENU...er.lnk
windows7-x64
3$STARTMENU...er.lnk
windows10-2004-x64
3$STARTMENU...��.lnk
windows7-x64
3$STARTMENU...��.lnk
windows10-2004-x64
3$TEMP/remote.exe
windows7-x64
3$TEMP/remote.exe
windows10-2004-x64
3Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
95d7253a90be8968e9e315859156bb1b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
95d7253a90be8968e9e315859156bb1b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$APPDATA/Internat Exp1orer.lnk
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$APPDATA/Internat Exp1orer.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$DESKTOP/Internat Exp1orer.lnk
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$DESKTOP/Internat Exp1orer.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$DESKTOP/ԱմƷ.lnk
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$DESKTOP/ԱմƷ.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$FAVORITES/Ա.lnk
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$FAVORITES/Ա.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$SMPROGRAMS/Internat Exp1orer.lnk
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$SMPROGRAMS/Internat Exp1orer.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$SMPROGRAMS/Ա.lnk
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$SMPROGRAMS/Ա.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$STARTMENU/Internat Exp1orer.lnk
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$STARTMENU/Internat Exp1orer.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$STARTMENU/Ա.lnk
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$STARTMENU/Ա.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$TEMP/remote.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
$TEMP/remote.exe
Resource
win10v2004-20240802-en
General
-
Target
$STARTMENU/Internat Exp1orer.lnk
-
Size
1KB
-
MD5
9ffaab5f197ee38cf1fe65e19d4bb217
-
SHA1
39ee57d785cb31b75fe79879ab5dfed14eb1a28e
-
SHA256
6a1bfc7b4d0b3c749f9a5737f7f0253c634bdd62fe812948807c6beae039ecca
-
SHA512
eaa04c6437eac713912a81b2e11f97cfdc38d5d5bb459d7f4ae94d140b2bd4d74685cda43697f00b6803b1b58da3bef78ca3d9d6a4b9f5e4278ff2451aee512b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429795449" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000021215434f599f9a96add06bd49b16b266416e46ab4de0928438034f3ac5de4f6000000000e80000000020000200000000ab03e604e87aa74db28e3d7d141fc1bee1ff7e340852f6c4c742d1380e676e22000000091f279177caa52f6cc6ba9f0fc82a85d41a3d5d30fc943b6f32291fe6bcbf0de40000000bcab9785071ad15911eeddd96725d658dcdaf2b3089e718e5c75b8f816e9476310d11b47f45f29bdd15f06c8f33af70105c07a9ee9d61c21b715ecc2cfc80377 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00b34143aeeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CF005F1-5A2D-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2060 1920 cmd.exe 31 PID 1920 wrote to memory of 2060 1920 cmd.exe 31 PID 1920 wrote to memory of 2060 1920 cmd.exe 31 PID 2060 wrote to memory of 2952 2060 iexplore.exe 32 PID 2060 wrote to memory of 2952 2060 iexplore.exe 32 PID 2060 wrote to memory of 2952 2060 iexplore.exe 32 PID 2060 wrote to memory of 2952 2060 iexplore.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\$STARTMENU\Internat Exp1orer.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.113w.com/?waga2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7073f47cd1f6141eaf800f115e458c8
SHA16c2e2ea1c7b2fdd62e357b45bab8c48141030ad7
SHA256845b7793972b80ace829231d4192ced8122999053e639fae8d3580a873576340
SHA512948bf142ab0c4a84b946d84206f8ac1bc718498e930c785dc4f8453a6277b0cfb20d8944e8fa351b7a22a4bfad2bcd01c51d6811a5ccb89634e0390541b33664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54879da94d40f85596b916fce9aee899e
SHA1ef7f08e3d2ce02b91e2a792cbe1ae882b4ebb7a7
SHA25641bc19fed9cf0de448268f928e773f12cbd24aa488f051c2267ad583cf1d27ea
SHA512c862ad40cdda5a26c94ba95ff966682ac225abec8d86a9103504c491bf07015c3c15751f92b1463dd05651514910d86a18e277420874bb0ad1ccfd78137e3578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7893eb5e565477458c2bf3f8dc1de86
SHA112b8e75af351d3a0a409fdf9f09210680d69a41e
SHA25684e2918f7a07701b8e948b843d847cc0264da77708d2f6cf740213887f97cc08
SHA512cf87ba9bf3242862816bf87ce6005720958f47cd57d7ed99b451458494bc62f16067dad7e3cb8eba1097d294dc047b9cb8258da47b6667a6afa6db8096a4a82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f1af5fab480af23ccb26b0ccaaa8ef5
SHA1a0b69a28c464c523ce2be8dfab66455fb67a8ca8
SHA2566d78b4910e4c9ae889b7a0d25d9aa9a3613b76f333f1d569695918c47da3c6d5
SHA51296c93f053d58a342bc9b4263b59d23ad96166b1e58be409f551dda63dd45794dec3f76ad7adabc7bd340693f66d3d0e9501e743cee1378093889ea21fa128624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55328828d4af8cd26c213ccc853944f98
SHA140f0530a1feb7f966a0f35a5ab61c500eb557f53
SHA25621213924f4fe687477ae1eff8989a1ba6a6e7ef440f8ad68d060b526d4c0e915
SHA512db197043178d61c6bf63e32f64b83674d0b83e62ecf2507405e287c32b30aab5ab0e3c3552a27c7a1133fa05564bff310a43a44d1f3c9976473e2f5e0c3b7c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdd598e666354f3e45a39ba4a6eeaed7
SHA1faf836cfb23c1940b75ae40523c61f7a6121daec
SHA25638ffc8da65264a99687bc9cced2dc8718abf65fa8614e3612fa299b12e2fd6cc
SHA5121b7e8e2a759728ba5421d74e3f98f20bb758d2f5dfbe72275fb43f6565ac42b76fb42cd84858e3a2f7213e91830c4211d8a00fe150a0db4ff300d0951dc66514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b7fa0b756c617d4f9be3a78b59eeb9
SHA1c1a163375d0e8671a51c5cddc4946669d85e0dac
SHA256a24a98483f256e1f28bf0a01d40a2ee78129eb6998fd8c499049cd138570e045
SHA5123b80b486393b7547b67b7afb652661a6ca62d3f09525c46406ecfcab7d73568e64660025e342dc2500dbf2f94d2f5049186120834dd7b60c5b9e67fbd3f760c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace476c9d49ef705786b281ea798ee0c
SHA10f34fa2289bca3794e016bd2f18cf6ad7f454085
SHA2562bde4a72077661f58a83bd6c56eddc589d6105efcbaef08526c87e0751e305f6
SHA5121330305aebf1c45072058095a28672d832012b996d32f679e07ea094ce3071a865d30f25796031b9e752d860d898e334bb1294b79fac2605b8280b91da2e106f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd8e765729d1a0b7cbaf256045783c6e
SHA12a119a20491e3f3d0db211bcb4d9d4906c25782a
SHA256609dd12f54a45fd221ff1f2a2b34a49dc27a40ccf45597d6dfb67306e12fc460
SHA5127befb642a27bca91ae81f8f069e893cda28ac2bb30f7c740a97294cdb6a1f6616552fb73b36d834334660b81ffbbe01853ac1444e6263221c71de44ee1c00fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc36fee245365056b609b5ac4bca7b8
SHA186e4c59c5e61868c4df491539088e01750f4f278
SHA256eea66a35a418860ebe9ab99eae2bfe43389ecaa6ef740fc0d6cda63633984554
SHA5121859a2aeae61772fa9fa99751b1227b4154c19bdf4bc56f6749508bc9dd6fa801982bf194e5c983804892507b6ad92a8e6de5e7907ce463f2bc64ea8efd0fdf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407510d298c3ff9e0c83eaad91ec7dd9
SHA1d6b76ba720a31640e4d8da2711fb3b016e7eb502
SHA2569d6f3e27fba4bd597eda683b6ff98cb9cef6652e4bbe43cd6f5b7a4ba5668823
SHA5124fd22f698716834bc22218a62fd6a6085c7723854a8385f6a677cfa79607bc117b37b584a9d7835f4682d4480d0b032696b44bfae62cc2c0ede188b388843713
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b