Overview
overview
7Static
static
7a57618a045...18.exe
windows7-x64
7a57618a045...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...oc.dll
windows7-x64
7$PLUGINSDI...oc.dll
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/Toolbar.exe
windows7-x64
7$TEMP/Toolbar.exe
windows10-2004-x64
7content/aboutTabs.htm
windows7-x64
3content/aboutTabs.htm
windows10-2004-x64
3content/ctoolbar.js
windows7-x64
3content/ctoolbar.js
windows10-2004-x64
3components...rch.js
windows7-x64
3components...rch.js
windows10-2004-x64
3components...bar.js
windows7-x64
3components...bar.js
windows10-2004-x64
3components...re.dll
windows7-x64
3components...re.dll
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 04:53
Behavioral task
behavioral1
Sample
a57618a045dfc6cdeb4b4e145ad96643_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a57618a045dfc6cdeb4b4e145ad96643_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProc.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$TEMP/Toolbar.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
$TEMP/Toolbar.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
content/aboutTabs.htm
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
content/aboutTabs.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
content/ctoolbar.js
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
content/ctoolbar.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
components/ConduitAutoCompleteSearch.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
components/ConduitAutoCompleteSearch.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
components/ConduitToolbar.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
components/ConduitToolbar.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
components/RadioWMPCore.dll
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
components/RadioWMPCore.dll
Resource
win10v2004-20240802-en
General
-
Target
content/aboutTabs.htm
-
Size
143B
-
MD5
30b063c23ccd0e573f7956a49e6ad2da
-
SHA1
b43ddff041bd7e3fdec541b0b3004ecd661db8d0
-
SHA256
dde0330a494598aee2dec1ed467b0ce99400b860a9eec03e59a963090736cf9a
-
SHA512
5af5794bc10afd6692ef9eccfb860248fbf656361fd6cbbe399e497bf0f8c9e9e603eb0dc3781344a53ae84578e1618e60a9a1096cc3a0b149e2e4c82c8c43c4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430118699" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d33584029358000fe79d6d48bf5ee8d395a97ba6b408078da2f340b210b53e00000000000e8000000002000020000000aed545515520e589eb339903af0fdcbe8e8c0f532d71662f322b8928001b1ff020000000590e7e6e9ef2e112c1802c11e3f8dab2d780558ef8d8b6cbfd977fa03149320240000000e3b8231959795edd8e6a76df5ab103dd4ad8240da534a23891f8ebb8b289398224f23d1e6631a879befbf43a12665585b2730dea4f55536c28e4a247de9f19fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606a81b12af1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD1851C1-5D1D-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1920 iexplore.exe 1920 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2060 1920 iexplore.exe 30 PID 1920 wrote to memory of 2060 1920 iexplore.exe 30 PID 1920 wrote to memory of 2060 1920 iexplore.exe 30 PID 1920 wrote to memory of 2060 1920 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\content\aboutTabs.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e134f0b2f9fa92735aca2c6aad19a1c0
SHA1cd06218bb47ff49206c50978b93270b3c0584585
SHA256f634e8b98994bb50a8c32f149b93798a76f24f25b09d037f313478f6989d7243
SHA5124ff93ae37c2af459169c20fdca68f238dd435b76383669878c6abf0b732333f01e24b2aba920493b4490cd96430ace08c4b1119cb80e8fbca83c5ab82c49f55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570bdf865b5893c6c922390ab0f049348
SHA16f8391bd08898a132308dff2ec3273790757004f
SHA2565c6cbb409faed718620638dfdc33721de2efef40843f14927c357190ff592c07
SHA512e7dea1fc30d52265003f3d2a6f44f6e602b76dd4a73cb3c27e1f2daae93a7963a267ceda98e6e34c395531988457249c07eb4da27aa145026ef73a49932a6164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333a903e285700ef5763cd795a664bcf
SHA1fc837ce9838a456b0534d53d7aabdd899dc78abf
SHA256429342d1c6c5491eee8f9972170bcd2ddfbd9e77a4c27e838e5cc0cfa4719c93
SHA512f71c3fb3ff20653d947af5bd921bb088fddb468454c3f61bf120eca600bd670c7c71b85c4544bddb2a69dfd54fb875b9ff0291fee7083b6f82a0a239ec4314db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d75034df72fb5529b3841bade411b4
SHA1272d17879d0bea142590aa699a5e695a67ff47c3
SHA2562b7ba56039b1236283278420f19062f7de232316431a7321a3e39ad5fbadfbec
SHA5121a20857c5bceded5443624314ad9538451a141b19ea11d6da6fcdcd1c1e94dc2d56e5beac6781e11991376f55141b0665d6aa901ea43c40e0e5abf984012a105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5f58243f77f3a56f13492aaf92adee
SHA1e3796b0de5b813c16861c1044316eace5bfab9a0
SHA25650a45be2814881a86d5a4911ae6289c57dfdcf751c8069a5bf0e28bf057a4a56
SHA512276d14b7b1cb91c4cc75bcba0f36e3984b44bd1fab376db076826c0a32448c28f82f7ab9d562e6c75ae5f0369373eb987c5adfd02810d6c6e2cb1d0256f4cd25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbab26e11e9f5418f3ba1049a20fb2d6
SHA17bbe164e0d3b84dc4d2f893fb2cfb0e87b41004e
SHA25623ce4452f7d1b8994442bd7db2aa7ac4853186eb5b86118c3664b95b5271271f
SHA51221a845247fff40a1a1524e179ac14f8f1d09cff5d670aca8a78c1a35273db3ad0250d75643d01d7328f7306f08654e739e317cc734f5816781cdf930b31b6c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f282ce34cc6b6a0252d35a1f5f5af75b
SHA1cf66f0611b65f2b2f2aee65b0f9b08855d26d3b7
SHA256505616bcf235826acecce018f7d7b8322fceca63f24445e43b2636ba722fee98
SHA5128c1a4bd7a3ee1225deeeb27cb60ccf0ef09067b4004d8750514d65c6340713454bcb91fb1dfbcf324a0e0c400a01801deb39c109658704624ab17e8af5c2ecef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042e75d82102de2314ecfdd915059845
SHA177c71e736b6729923e8ec7e0d55f45caa7d5bbf5
SHA256f0a20985a1f873553f03164d0ae655b57ccd898091e3db788a2e0be2e379cffb
SHA512b93e681f062f63413f05ab1860b66bb83a97bff7dea96ba3df7822d51a2a4de26245789155885037643ae219114c8467caf96967cccfc3e324a976ce7aad4a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27e8ca26d2bd2ae76b267ec78707a20
SHA185660c76a4812f1d6b0b1330af2b44cacba317fa
SHA256de01dc88540a9f71cd009eaa89030d29eac4a9edbcb58999ec30da4fcd4ed0b8
SHA51231eac5ba3d861e47912798e1c3cba633ba7d525b2f6d8c25fb40c01598e93a70bda6622750b9f1095a82ad32b565fb0b902c64be4fe70c3bbea6b074340bae6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422af826b210f81cb26a5824337a3094
SHA11f7ece9985d4a19d1ae90dd757b8a4970009bfc6
SHA2566f8355796d44d28ec9e79b014a6b351ca6b5d0c0716cc24c36ee5e163db7ff18
SHA512e0087c3d14fd62141704830b8e68793108ec8d31fd7ddc9d2f4aec38e4561719d3a0d590107c3e720b14b941aef83063ec502cc6e035bf21deec114497af06df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5402517f3f0d58db840e5ded66f831683
SHA1493e96b42dd030abaccb9c0b1d86db99323ecdaf
SHA256b4a80f8727c9d717162e6538cb4d427d7498a3eab86a8a86b8f07586fbfaa5da
SHA512c2071426e35658c01014f086df6e19fae76b1543d28d7422121f79b648dd2c73160819042a87da5aa976b18cb3ec866f4886b47e0bc6ea0d51c4a533c8f2d432
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b