Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
0cc6f4c8e4949a4c95a3b0dbaaafa125_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0cc6f4c8e4949a4c95a3b0dbaaafa125_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0cc6f4c8e4949a4c95a3b0dbaaafa125_JaffaCakes118.html
-
Size
184KB
-
MD5
0cc6f4c8e4949a4c95a3b0dbaaafa125
-
SHA1
4ed7963c1f8ebb9229ec6b39af1a62ef44f9bc1c
-
SHA256
62aa0fb28eee4bf88b1267ddedfb1026a416ee7cfbb21a44bb4c7557b4118852
-
SHA512
df733770b1a75967888f58c2bbca7a847fd53f1e962517a3e6af9166fb35b22ffe77c087b4b580a7f818b550dcd853597e850133bd5fe0145d0f2c3b5d230ea7
-
SSDEEP
3072:th5oyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFis:bsMYod+X3oI+Yn86/U9jFis
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2660 svchost.exe 2584 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2352 IEXPLORE.EXE 2660 svchost.exe -
resource yara_rule behavioral1/files/0x000f00000001466c-2.dat upx behavioral1/memory/2584-19-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2584-18-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2660-9-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2660-6-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px980B.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA1E8E51-07F9-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0117fa0069cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420757357" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000b804bd8dee0c0f0d9ab452655fff21eb75b5e9db847a7a10498c9112ec204520000000000e8000000002000020000000ec3ef70ec8df26cd500e090dddb0ebaa2255c745ef06dbcade3436debc23c38e900000009a402aded5044b91b928e9de6453e8c76155d5502db535f793c9400c68381b33853766dfe2934811bd631dd6b60c370e1f5693721cf8ecfe96fb381550a7240719253ce558d97f435eeff513d7fbaefa11317cebd551b7e79f76f9a6e02f18471ae215c5b98e03134c11989d685f57f76eb7aa002e79a721d272bf6239583758ea728fc7f578f8efd117ea94e10821904000000094d8e76e4c537324cdede1fb38e2eee97d1d6c4117c970bcc1dfce1fd38e152050f1102463288c7302b80bc92e3e723abf6592ecce24ba466ebe997bbc85c07e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000003e8db52e227639ccadbde48a1f17d5d2991a8b614a61649c600e3a386094cae5000000000e80000000020000200000007627a453ad9aa686a0e46789f7de7e00d890951dada866017629013fd2fe460a200000003d002ebfa42e1fb26c0e08e5c79f394198ac4ebf0ee080efe56486be63cce76e400000001f66864e2d62ea39d1b5fff658b8f7899735eb14018497f825db9a53cebd98673f35b1ef3e073f858dc49a4c742393bc42cc73865a8416b1181a170e8dc89348 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2584 DesktopLayer.exe 2584 DesktopLayer.exe 2584 DesktopLayer.exe 2584 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 856 iexplore.exe 856 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 856 iexplore.exe 856 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 856 iexplore.exe 856 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 856 wrote to memory of 2352 856 iexplore.exe 28 PID 856 wrote to memory of 2352 856 iexplore.exe 28 PID 856 wrote to memory of 2352 856 iexplore.exe 28 PID 856 wrote to memory of 2352 856 iexplore.exe 28 PID 2352 wrote to memory of 2660 2352 IEXPLORE.EXE 29 PID 2352 wrote to memory of 2660 2352 IEXPLORE.EXE 29 PID 2352 wrote to memory of 2660 2352 IEXPLORE.EXE 29 PID 2352 wrote to memory of 2660 2352 IEXPLORE.EXE 29 PID 2660 wrote to memory of 2584 2660 svchost.exe 30 PID 2660 wrote to memory of 2584 2660 svchost.exe 30 PID 2660 wrote to memory of 2584 2660 svchost.exe 30 PID 2660 wrote to memory of 2584 2660 svchost.exe 30 PID 2584 wrote to memory of 2828 2584 DesktopLayer.exe 31 PID 2584 wrote to memory of 2828 2584 DesktopLayer.exe 31 PID 2584 wrote to memory of 2828 2584 DesktopLayer.exe 31 PID 2584 wrote to memory of 2828 2584 DesktopLayer.exe 31 PID 856 wrote to memory of 2480 856 iexplore.exe 32 PID 856 wrote to memory of 2480 856 iexplore.exe 32 PID 856 wrote to memory of 2480 856 iexplore.exe 32 PID 856 wrote to memory of 2480 856 iexplore.exe 32
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0cc6f4c8e4949a4c95a3b0dbaaafa125_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2828
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:537609 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2ebf7ebeca370da0074940bac6d7e03
SHA15fb377376b629c85b4e0b3eb880f6e4ec5b88366
SHA25668a872d6741480f251f5c358f12438a29c9dbe451e611ddc3d0495ede5ef237e
SHA5120334725dfa8407a670597c2bbebc0077557b154967acb0a35d5ecd31883cf2b1313b1c762c21d5c4597a456ba9253969a9a50a8a942af767a2b09a6735f81614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515cb90f61e639417a70fd66425c5516e
SHA1af618f24d02bd6ee7ac7fa51873ae6cc7c8ba1f6
SHA256a050da822f4409b2724689f11ed1af4733c895e5b3c2b32f383258b83b56610d
SHA5126a298bc5433d72ee6a3d7a8df501f45bf9be85d2e78e09abfa26a53d9d90020efc30f6a00557a210498189dd9fd75c108e5c4907642a1b8c6d85c213eb1852c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e862285b8d15d15f46aaa9306dbd693d
SHA1ad8b6f349504556e3c22ee189c07b83c32038ac9
SHA256843507a59ca0ec5e0d31bcd2e9350082799810eb85db57c3a12e10ed25aeecf9
SHA5123d8c3d08c512b5995d7bc964cab64d6b12341fc2fe9f0f0b3385957438ce5b971cb71d1392be90d81441961ece3ea076690875e085ee20493e739980d31c3a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bca76964d32ae96b6d9ee9ca8886387
SHA1993d698c5757df0930c7ffb3af01b175e8af4454
SHA2569ae5c664dd4130bb5400497b02a728344248d66860185f3c741f2fb1179a5df5
SHA512bd5186a8326027ad953ffcde823b24275dadaae9b817bfc8c04e25dc95c4132632b7eb4b96e82a3628e0060a4a975224084b05b31d51d78875d27a6fe5c3832e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55110ab9bf236e5ef1c691e975add1155
SHA188535561b0d6f3ee1913f8b776a4bad615e35e1b
SHA256082aa7a0fa2a6485d08d29210dc8cf60bcfc644458d53348b658c3ee8ff1578f
SHA51267443dacbe14170a9eb14b1ec5f54e472f1f8a7faaf68069619232a674d590a6ffa03f5ce119e808685965ed846b2aaf566fe17240b644ca10c18ce5bc913cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab300ab7b9b083e4ffe6d070ffd693c8
SHA1a41bc6422081e28a1de8fd401e88d190334fae28
SHA2569c06abe365818e7d2058870fbd18118e1c1ca82fd01dab059e3524a08a898ca3
SHA512f1494a28ff4e73548a1e4518284b9d427873ad105c558cbf30a15d547488d691b627bdd80bdd80b46c1129fa683cbd1ddf1956fc9e5f6be39f665019aa4eef52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2b61dd1913ba27af561c0c27e63a3d3
SHA122d115357c1789309be29165ad5f4a23fcc7a51e
SHA2569c84b82ab4bf0ba63dc686e4820b069f25be60f3a93f785023278c17e5e46761
SHA5122f3391167fd7c30bb40394aafee5fe89bfbbc1f50f365dcd240c6097967cc2bbdd9586b46373b652817177c40d87f3eb045bb2a757c4520e9ff211684afe1e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5947ac989440637aa77ecdb0683512eae
SHA1feb79e83e13f7aea6506723ef465c8aebb0889e0
SHA256dede56048337e66bb9f306bb5568d60864b27feb0bddef589c3fc5bd36bcef1f
SHA512d51e099f335fa6f3737ca6f574e932936cfa0030dba7ea8002019e07781aba71ac70a695963d93fa7bdf1fbd2ce82ac751babef68a77d873c1bb9713f45abd0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c8618449a1d0b97e55ced903237d5ae
SHA18e01d2d763e5a3a047dc4808f535269d2ef6ea42
SHA256981043cd5898132228598d83f9a0761f36e3209e664e16543c3b482c9688fbe6
SHA51212b95eae8f2876d0504d9fdf9d09f9ee4d1bc7ee059ce6c22fd62ad2068bd29bbe61783469b044481714c3059fada6aecb080c2ee0ab770f3828e994b82a8ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570261582fe03f9e3b1934bd176f70c43
SHA19279e8b5b49f5613ed859a9214e2a2d62d5b8e8a
SHA2560827773650dfc4961b9310a12d783e8592a59dea069ed133292b891bcfaa7597
SHA5123e10f749c8b5ebcb995ff3865969c5a4fb6a9da6138a0c14907fc4122103300508cc5b33288398ebe884d3f0715e72355407728482c7b94c4de377913022f183
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
83KB
MD5c5c99988728c550282ae76270b649ea1
SHA1113e8ff0910f393a41d5e63d43ec3653984c63d6
SHA256d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3
SHA51266e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d