Overview
overview
10Static
static
3c89fb8c0ea...18.exe
windows7-x64
10c89fb8c0ea...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7about1503524378.html
windows7-x64
3about1503524378.html
windows10-2004-x64
3blog.html
windows7-x64
3blog.html
windows10-2004-x64
3bootstrap.js
windows7-x64
3bootstrap.js
windows10-2004-x64
3legalStatus.html
windows7-x64
3legalStatus.html
windows10-2004-x64
1relevantSp...y.html
windows7-x64
3relevantSp...y.html
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 10:12
Static task
static1
Behavioral task
behavioral1
Sample
c89fb8c0ea26b49a33a2d777df07182e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c89fb8c0ea26b49a33a2d777df07182e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
about1503524378.html
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
about1503524378.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
blog.html
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
blog.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
bootstrap.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
bootstrap.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
legalStatus.html
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
legalStatus.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
relevantSpecialty.html
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
relevantSpecialty.html
Resource
win10v2004-20240802-en
General
-
Target
about1503524378.html
-
Size
6KB
-
MD5
58415977fb6759592e62a665a5537c5a
-
SHA1
e24e65dc8b66b3ef329812cb09a1ce28c8a1342a
-
SHA256
18c7a191c6910d201a5f9c26b068d52db7e9a1090bd4be5674ddd2d9328c39cc
-
SHA512
4393ba5f568fc8dba4b39017d1d1678d0a5fd49cda546d7c0f7fd142177e401da694629ed5ec8ca9526f85e370325232c1613c95decd6156edda349a0a967850
-
SSDEEP
96:9Daj7Hg5GZzmxfJ1cql798sqiRXdGASMDqTi6EOMpt9aPyXoCdosYZHPYHSpTqBF:9a5Zzm13JlhjqoXkdgqodp2z/5FzpmwW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0009b410fcf9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431088238" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C314DE1-65EF-11EF-AC6D-CE9644F3BBBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000001d79197e90189dd711d36bc0d1393b405ef27f7820648faa2e4bb1fa063daddd000000000e80000000020000200000001e9f5ccfe091cb19ab425b1523d23664053c7ecca1a2a57feadc032703bd635e200000000f10ae022baaf7a4cb9be7fffeb142bce619ba68167d1b9c653f90c0b8a0382e40000000e8bc542c563ff883a77efc105c62bc7f76f8a0ab400d2fae111331bc78c993c55b4f99708865ae5a564b9618f02745ecea608975754aece5bbf5c48f438668eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2500 iexplore.exe 2500 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2392 2500 iexplore.exe 30 PID 2500 wrote to memory of 2392 2500 iexplore.exe 30 PID 2500 wrote to memory of 2392 2500 iexplore.exe 30 PID 2500 wrote to memory of 2392 2500 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\about1503524378.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b498a7d909de83bf738461cddaa5a2c0
SHA1c0fb3d1b21052fff05454fcf572eabfcd29568c6
SHA2566bd5a1cc640911fa6a0a4f5f3436a01b2371db54ced82a48b60e57cdd98d9c1a
SHA512e437226d03ff35617b3f21414397c9ed85f5728db8c127454a6b75e82cf8a7f1eeaec92b39ea3674aea4ccb9e1688db2e8eb455dfdca5f616744b12a1ca0d618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da250ab86cb82055a117d05d8d600b37
SHA1510f119d0f3c1c48f54fc6b9500c7d7f84176fe2
SHA256e32d07c48a1b513c3adaecd1c1e26d7cd4fe1ea65ffa14edc97dba61d5a8bd75
SHA5128a1c8080274cd85d32b29c385b4060b324c020135e9d5a018fc15d8d3ee7e02392e43e1ce1e8b348fc6ed393114fd6a2e816d4f117735fb190fdcec799d70195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e8a4a9c306a446481cdfe94c3a5169
SHA1d766beaaf847a51d15253582ea1d5f66024c4d70
SHA256b28e1fa8fa4fa0947e812be9433c6b2d5300143ed1e3cba20d6e7a39eec6a4c3
SHA5127a96b6d8626adcc01a57366daffebaf772e98a5ef6632a042c8ae14054a73029d933a556341b67302785bea6afaf99e6c1a2daacc8d7184ddab89b9669a38b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6b49a3530b086091534bda7b2fe08a
SHA188d74cde2f23000aed77c986a5063b54e07d7c32
SHA256667c434ff046d5ae02e4bddb3fc45c1b30f2e6fb103d178cb2710578de3294ea
SHA512e19169b1b2cb0983f158c963585aefbc2d148a523390e02220ae5e1a2167fb85438eaeded8c31c98590507d7efb42b3268c298b7da9609abe4108af4b3392cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556506275b0c3a0ae945839703b14209d
SHA11794de7f6ce1ebab41f68f0039579a30fd749415
SHA256d6b21b49b60af922e037d0d05123196be5888f02cfbfa6cb7238fae3e8648ecd
SHA512e6486e2f968bc40731ce216df9fee447b8e286a9c01991d1ba13ae2bacb045e7327516b0f7c22587ca7c1cab18b9005fe7f25c5f6ecb2e48d978124a09237d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2f8c3de10da083500f4bfbd8ae863e
SHA15e24fe54c37114ca06dd6580637fd3a37615eb3a
SHA2562930c8f432caa624633631e9fd1929b85fc6240f8d8e2c647cb913fad724ca62
SHA512aa4aa4db9b503a2dc67c438a5f1f63a9ef123b9a05bcc71e7d5aa1ea178ddf86fc2d734fe728ac551df36009073ed6101dd79e0a364111c470b22a7a9d2e2047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55de79fa9946ca059440d9c4737f37604
SHA15c506c30954eb278ff4e1fc6514fe57d197ccbc5
SHA256a5e1b87645a1e189679315cfb8b5e6a3900d41b882371269b7a319f2d01e5008
SHA512eb021754129bfd9d96c0bcc15c6599b85a2100c03acbc966bb3df2c4e4a00c8992a624ab3c7f6002895ac0fa49d1c7f8972321af5665b733f78db9f6eda106c2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b