Overview
overview
7Static
static
7d0fef0a79c...18.exe
windows7-x64
7d0fef0a79c...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3SlgClientS...ts.exe
windows7-x64
7SlgClientS...ts.exe
windows10-2004-x64
7Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3aminstall.dll
windows7-x64
3aminstall.dll
windows10-2004-x64
3fmod.dll
windows7-x64
7fmod.dll
windows10-2004-x64
7gd204.dll
windows7-x64
3gd204.dll
windows10-2004-x64
3granny_download.exe
windows7-x64
7granny_download.exe
windows10-2004-x64
7help/controls.htm
windows7-x64
3help/controls.htm
windows10-2004-x64
3help/credits.htm
windows7-x64
3help/credits.htm
windows10-2004-x64
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 03:37
Behavioral task
behavioral1
Sample
d0fef0a79c28f97c5df3e1ba89d06437_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d0fef0a79c28f97c5df3e1ba89d06437_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
SlgClientServicesRedists.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
SlgClientServicesRedists.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
aminstall.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
aminstall.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
fmod.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
fmod.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
gd204.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
gd204.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
granny_download.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
granny_download.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
help/controls.htm
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
help/controls.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
help/credits.htm
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
help/credits.htm
Resource
win10v2004-20240802-en
General
-
Target
help/credits.htm
-
Size
5KB
-
MD5
27911be4cf525e2ac3ea0e5b7c6d6aa3
-
SHA1
19f6e80da537b6924d40a0f7e973cb705217a739
-
SHA256
e5ccae407e45ef85931f38e2585c6ae0d37c6ac7da7bd49aaee06d754511e068
-
SHA512
e173ddacd9d0c0720e25dd6de75edcf9cd5545f98f37d83f53e5478993802233cc4b0416ba26a8afc3438d9bbc5b1ef41d0bcfbdda42970fd73dc3da42104541
-
SSDEEP
96:/hYAKEmab1SCL/RlqUI9k6ZZ7KU7ps1ld5K9hIJGWnEZ/EeTduIEY0WmNV+iCMC4:/hYAlRPmZvE1W5acKb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5061235dd700db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000022abdc2904c28616e1c2726e7eadd702ae93b08d785eba3c185c6ccb4aeb35ed000000000e80000000020000200000006cb33b324a49350a40a0a38417ec04ef29a853bdb43d2b7c4536d6cf5ccfdfa620000000cdc307f2bcae5befef98d6ce6073a74d508e424c0d5a09cdd544fd471e7cc0a84000000058d9153a0fbb70cd24e5855932e8137533c147365fff84778287719b32f8dbb726a0034cb2bdb1eed5def8f8e7128791b7f4772812c2bc5826501533c76940f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88AF4461-6CCA-11EF-8AE4-465533733A50} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431842128" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 292 iexplore.exe 292 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 292 wrote to memory of 2236 292 iexplore.exe 30 PID 292 wrote to memory of 2236 292 iexplore.exe 30 PID 292 wrote to memory of 2236 292 iexplore.exe 30 PID 292 wrote to memory of 2236 292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\help\credits.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c6bb66cb443b531b4d3b79ccb00fec
SHA1184bf8bb2c56a508f2039c8e030721f61d0cf059
SHA2564d5ebcabcdaeed4aa1b6f2368180a5b3bb343427f41eaf46e89ca3e9b579938f
SHA512e1d3f55164e7a888731c533b324873b8b5bf0aa518a63a15a1c78cd20d768d636e0c35288743025f04be19910d69b75dd5af6c99a1c46b6e26ee1ed7edd59274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51349a3ad6c3b18fe153c2b9aeead00c1
SHA17858763b729f94f196dea9b36a7abcf530dc5925
SHA2563becd61d6d184f6bc118f0dec81491f624624e896f930350c411c0c30a754284
SHA512a5665b2c2c6c0577ca77eeed3b765ce34a65692473fdb024c227da1ad3471b92475f644fbc0217469a1550cac80b155b4359f5f05822a51bff36a202a990bdad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0f5bb531cf19206ec47a0aac289647
SHA1e6dbda84fbe9954e3339958da56b410e81df386b
SHA2560b8a1f8b1c24e26101d54d5780aaa328ad7c1d9ec92a006b3f16c7e60ae209b6
SHA512f8c7c7fe6348158aafd2f17a93a992d1867927799fd0f21f0b9d12f2b7fbe379cd01c41bf56461253cb7be3968efb3f6f543be7be41b9b2bcdb29ed8f51056d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556985c57b723e3bb6867951a0812dc48
SHA1df2ea47bb673c290690b748eb25f7891021f0afd
SHA2566365ff4aef2481ceef8dcb7feee1fc03159315aed5ad78db432ce0f673a7d915
SHA512a0df8f295bed0b75b81cc49e0a76f32a79222b0711e8b8ae98e097b8a3b4dd7c6b4a2cae3c30ab303390f0b3bfae5be997965871fece9c74dc16cd1fdb6127ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540bc2b5e6f49ef17f41d5c37667d33a7
SHA1fba2ecfa8e0f0281a77184f66347959b318ab21b
SHA256d25d6bdb5307455132d40c23e933b6f2dfcddf015c10040e764a6feab0e7a4f3
SHA512fa6b6d453eb849642f789d9205c614db932af9b6f6dc7dfef27b75d9034024d317fcfb6d98074eb2b8f68c55f54306a946ae2e8563de1581534ac1e3abfa76e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c726caf6e06fce6845684b9ed2fe6aa2
SHA1b16feb0b25ecf4eb147891bda1aef747b0ccbe65
SHA25615607854ca516e100f9c31620b704702060c480b35e4a95a36142231433f9d2f
SHA512b2ae2fed5acf1a5d2d953500a14ddbed26b3e3dbfb4ca0ac479bdff78f94312c9a7a8bfff5c814487563121904b4b3a8448d618cc7aed5dba07cd8d1deb866aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd93acce48b0c6cbc2c8e1189a9cb9be
SHA1f867f3fd7d295d60ecc52f8d0405a07e0e0d4ebf
SHA25664b2bd67f6ed743ec785d66ca35528b14c3fc6c96ccbba055831f6fa0282043f
SHA512e0bdd853f157db3bb0095a4ebf883adfe2beed01dffbaecab5cc4763ccde54b471d517d65c3f80bf25b36c115f844827ef44356e09abb1fa20b07ad036042721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545564c5c21680f9586606709855803a0
SHA128b2e1af0de396c3212b12c232d40453af638985
SHA256c790348304c55b0229bb7a6b55878c86627386fe2372b5e360e76f4338be77e2
SHA512a1ce9a1d17af0638dd952e141f6edf1a096c3a9c05ab5ca1e9731639f0eeef840c59c10c0ebea124d939b19d1d50882ccd4a9505838ba46b8665aa73e4ec6c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5640cae90a30727f835b78653e8bddb45
SHA18d2647755028c05e5ad3006c2a0ce8d489dce489
SHA256e323a095ad07ea4245ed657557782f845c37ce7aa5ba03a34801ffa44c3b3966
SHA512f8e2276e50fa1d0bf482ed3f0a19a5861cc111ac42f56ba689e1809a36bf759438675b2931779f8d72a0b51ae9592df723444fb1dc4e668bdd0d66a82cc50c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf9d030cb963f1f3f54ead188d179d2
SHA1cbbd66a6e5237db1225870be27602caefd73f91f
SHA25609680a735c2904e18c11f513f68fa20faeeb63414623c78dac948b1c67af869c
SHA5124f56615b729245bae45bf70a6938296bb0c7e897b634af6d5ade0f497d3c7ee18d6ad2d1618e1be96dbf132b2c8513bed0006ee935d2530efc1d3ed338f584ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b