Overview
overview
10Static
static
3c615257b3d...18.exe
windows7-x64
10c615257b3d...18.exe
windows10-2004-x64
7$1/$OUTDIR...er.exe
windows7-x64
7$1/$OUTDIR...er.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
32611067143.html
windows7-x64
32611067143.html
windows10-2004-x64
3contact-do...g.html
windows7-x64
3contact-do...g.html
windows10-2004-x64
1home.js
windows7-x64
3home.js
windows10-2004-x64
3home1099482986.html
windows7-x64
3home1099482986.html
windows10-2004-x64
3home1259317828.html
windows7-x64
3home1259317828.html
windows10-2004-x64
3index1449123078.html
windows7-x64
3index1449123078.html
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
c615257b3d156324783a0d0240bd0cd7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c615257b3d156324783a0d0240bd0cd7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$1/$OUTDIR/sftp_plugin/tc_sftp_uninstaller.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$1/$OUTDIR/sftp_plugin/tc_sftp_uninstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
2611067143.html
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
2611067143.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
contact-domains-org.html
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
contact-domains-org.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
home.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
home.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
home1099482986.html
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
home1099482986.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
home1259317828.html
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
home1259317828.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
index1449123078.html
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
index1449123078.html
Resource
win10v2004-20240802-en
General
-
Target
index1449123078.html
-
Size
10KB
-
MD5
5f05fe70d58d5058c7b0997490bb449d
-
SHA1
13f38efe4f41f86e72726da215c9d62534148e00
-
SHA256
8ebb146e6e3e9741f2c889baed2e96afd23956b8e71a5fd1114c46769b8c9777
-
SHA512
b5e1eb1df064bbb8dd204a269edeffb38131abe99cb3be987d757e74e1cf467cc70a003a64ae7b8c785f7b42fa2ef5819eddf7072a2ef257d5c22faebe73aa69
-
SSDEEP
192:klcdyhPpWsd4jd3hOWTxtkUGgYyRjz1JDC708:5wWsW533HpYyDJOj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48C7BA41-64E5-11EF-ADD5-E21FB89EE600} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000daf69d09a6510a3c68a8df9b2e5c3096ef83d923ec4f4a6c0adc7c0aab004061000000000e8000000002000020000000ac23b0ac489c7aa2aa2dd5990ec9c1e53fb62343bcabd07470c545d65cb4203020000000781e328a9d1dd76d16eb5bd9c5bc7cdedbd1738acce442e8144e71a9bfaf6eb540000000f669399c0e91f29fdf82d43108d3db5069630f6b7f3c20e745e9d5be880b183c1a3197e766b79d33ae949e36d14c037a5108497c1932b974c61d4deee2e4d9d9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60035d1df2f8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430974009" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2832 2024 iexplore.exe 30 PID 2024 wrote to memory of 2832 2024 iexplore.exe 30 PID 2024 wrote to memory of 2832 2024 iexplore.exe 30 PID 2024 wrote to memory of 2832 2024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index1449123078.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d5676b1de7b94628fe8163eb2622325
SHA1b5dd7ad74293210885dda6f3257869490f34ba6b
SHA2569d5553d42b7f8e5d30ce5c92ad89372441c551af1f2d7f14422689003c6f54f4
SHA5127ada46fa565a8c80662436eb17d94d5aab133039411b148f8e9141c9fae10db6793abb091b24e8e2ae094190b6f4dd240e5dd2b5510e9ae9d5be14b373780ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e43d30ea8bac0341c7670ffc270a8db
SHA151e28b487db1495b43e44bdae7f8b8cc05bd21b6
SHA256c48429bad87dad1bb286aa4383c8f34af0702791aaa6558efe350b826eb64410
SHA5126642ef261ab6b7a02a5d2301c2edbf0e370e9a9d49d929063452744700985452dcba459b9f4ccce121aae48aac9aee46daaded1f5598a124c4f4e14917a3c0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b8173b6261dc4e4018085c35105f99e
SHA1999f2f60da5251d9abf83af9e4edf07f81472e66
SHA25697dc7789872423afa24a8bff03a08738c9f8f1e0f7505970e8dba46b6e367ed1
SHA512981af41c4b87af8856668ef3c8e8fd97911fc76824fff96e087623d9c29783c4be3d08abaa0d8cf656f3f562463840206fa6bb626a895351a26bc1e593f60767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5673d18ce874c9279b224bb9be3bb6207
SHA1140708f51b914de1b5cbb4933afcb9e6dde02d74
SHA25657814ca7458fcc497388da6a945913c6c3a29167b5d6fdbd9812c3df162430c8
SHA512b23610419515629b58f90ba7509b81f96d36cf641458e38d56cd24a9bdb3411b3122f1e8b525d408fc760a8933a8c19af29b4fb6ece94f020ffce32f25c18596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b27f6fbe2f7553586550bdb1b3ce383
SHA1cca99cbd4df6e64cf34801b514e412adb642c0e0
SHA256f4addcc37502f05328ef9110c1fea39ba139fbc34c8696ffead2ffcaead55c79
SHA5120b75569d84dedb8b6649262d5e88f4038a8c1cceea2501fc5fa1207425152ee0769d06348c42f5a4355fd0e93fc89e33c829d0318355a5f3ffe1fbd26553e606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6eb70a27637fd56ecc036502af1d58
SHA111c99aa9dbdd84cf0b203c6cd45dc0f9cd85fa5f
SHA256949f86f98ddc9ca120c862067110cf3a2ec6dca610a5635b1e3b755fb33d093d
SHA512c1fe11a37fe475d7db9173a6f914079e4840e61b7575173a4b54a4f1a88edffb20ffaf6619258cc7fee3affe98091636182548f2546dc7203fdd0e8e8918aea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579fccd26153a6773c8ed5879d639ce34
SHA15ab389c55f093cb76d175de975b8daf13cac5748
SHA256316f5bae6b3cd76dbb77d1a101a04ae8f69dd84a98f59b691bcb5fd719467f16
SHA512a8528456e760d92c9828c3dd56ca226499c9eaf9c7557cbd5008665a22adf16c0132adce47b55f91cb559f7033f5ee47c497fc5f4936f980ae5458611c321cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1710280aaba090201358ebc29c2f7a
SHA19590cdda80bcb48383910c56d580d96dc0e1d3e6
SHA256d3522c5a394c93c9170fcd30b7ef165634bd195dd8c7ec08e4243ccb509fa805
SHA5125bc95e57760672277e065e2c99e4edcf95c7a88ed8c8e1edd2f217df8a712fe1d1e46af52da35b8e46047a8328cbb5e5a3afc7fc3f187266ca41e61adf04d231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518024ea603ac69c842fed235d6bd4d0a
SHA187f6cf66e23cf870a2769447f7c763eac52cfc2b
SHA256db848097aaa8b7bb7a21a6579f46b813d910b65797289e0145d65b05f9b7336c
SHA5124573e819d22af850183e6be2d26b7a319411ff9755d3de3451e89aa12ff0378a016b466697964e2f56af31ae51cbbf1c3300a161c7513d03c2f159fb2fc39a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313557106b3f498057f76aebc52b0ba9
SHA1267a213e1fd7f0326d42e1da0cf4b10e00831f53
SHA256a69ade1e47a2f2d628d95f379a335de3b2486d6e68dcfb8b0081286a2ecbe7d7
SHA512801a2ed0101b271f4fdb99bf65a7de70757de361f8e868534f84ae59a126d2cafbf57f0ef45bb40129dfdd575f535372c2059016ff7806fffce0cbd2d6752a13
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b