Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
4f04e82a0457866b64fac9c9f778f26c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4f04e82a0457866b64fac9c9f778f26c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f04e82a0457866b64fac9c9f778f26c_JaffaCakes118.html
-
Size
125KB
-
MD5
4f04e82a0457866b64fac9c9f778f26c
-
SHA1
7228ffd48a47679ca364560fc3ea9ecab70b9890
-
SHA256
f58a390b3bb7585c80cc09c9e1b358c62a4d5d2fb509415ca65d283b93b55292
-
SHA512
7d38bd67be4085b6695915437136ffd4c24416cec37b64af44105b66e8d008ce03f4b7f1c1b038133aea7681180196bed6e22d1b3e99b44df18d204d86b5d360
-
SSDEEP
1536:0H4XyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:0YXyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2680 svchost.exe 2512 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2504 IEXPLORE.EXE 2680 svchost.exe -
resource yara_rule behavioral1/files/0x0006000000017052-2.dat upx behavioral1/memory/2680-6-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2680-9-0x0000000000240000-0x000000000024F000-memory.dmp upx behavioral1/memory/2680-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2512-16-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2512-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2512-19-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px34B7.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000fc5dfa41d54aba2d31cbe8cb654ca9980322f80ff67d7a5edf6b7bad41d47ff8000000000e8000000002000020000000e9bac5a69907153e9b8c537eac60878cef843d558fb9061411b83938cddb860020000000741aa494db4a631bc8b1b6d8807177f899774d7a1ab46ab3ba8873e264df5172400000000614e36ec659e05dc1aec8e3c46ce6ec0020673fd3e19718f8f84e5e180280e255ff1816ed949c6242a4fe652d96e0abf3b7a3a3b200c9d56c4c3888bb796516 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422093369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b12c832da8da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F7A4601-1420-11EF-85B1-6A83D32C515E} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2512 DesktopLayer.exe 2512 DesktopLayer.exe 2512 DesktopLayer.exe 2512 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2728 iexplore.exe 2728 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2504 2728 iexplore.exe 28 PID 2728 wrote to memory of 2504 2728 iexplore.exe 28 PID 2728 wrote to memory of 2504 2728 iexplore.exe 28 PID 2728 wrote to memory of 2504 2728 iexplore.exe 28 PID 2504 wrote to memory of 2680 2504 IEXPLORE.EXE 29 PID 2504 wrote to memory of 2680 2504 IEXPLORE.EXE 29 PID 2504 wrote to memory of 2680 2504 IEXPLORE.EXE 29 PID 2504 wrote to memory of 2680 2504 IEXPLORE.EXE 29 PID 2680 wrote to memory of 2512 2680 svchost.exe 30 PID 2680 wrote to memory of 2512 2680 svchost.exe 30 PID 2680 wrote to memory of 2512 2680 svchost.exe 30 PID 2680 wrote to memory of 2512 2680 svchost.exe 30 PID 2512 wrote to memory of 2416 2512 DesktopLayer.exe 31 PID 2512 wrote to memory of 2416 2512 DesktopLayer.exe 31 PID 2512 wrote to memory of 2416 2512 DesktopLayer.exe 31 PID 2512 wrote to memory of 2416 2512 DesktopLayer.exe 31 PID 2728 wrote to memory of 2312 2728 iexplore.exe 32 PID 2728 wrote to memory of 2312 2728 iexplore.exe 32 PID 2728 wrote to memory of 2312 2728 iexplore.exe 32 PID 2728 wrote to memory of 2312 2728 iexplore.exe 32
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f04e82a0457866b64fac9c9f778f26c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2416
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:209930 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527b7299ab0666ce277a7ee4fffee6a87
SHA109cfdbb11252327d8e5b3d639beb7dfd12dec43d
SHA256ace3326890fba1db6f097b03534f12bc3bf39461407935b3af24bda1ef71991f
SHA512a69aaf0965b0aa5a109812b2d4ee470dc1751b3c0c65c86131a31ba55fbe9bf807a87d91d7aa65fe7c53d51b9f5a9a4a8126149ececf7e609d68c5f31eefdae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4f16bc1deca6a837a7b76abb381e75b
SHA155cc99996e2cd3395292c45eb51f2541e125e8cf
SHA256744494bd09c8abc736a51c867124705332a965eab57486cbe7ba32754d29bfae
SHA512b445d2a177482f99a348a626ea7e453e1b1b436478fb18642e5d65c7b000022a2b4351c5eb68adb8a5dd80dce6b7cc06146b662366eb780797df1deea3ffedad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5513c85952b50b2ce6a498173dd747801
SHA10e5ba7a82615ab602369149bd41c25912de8c59d
SHA256d06534e0f42611764165f683b3ea82356dc59db70bef503630663a52c6a40a86
SHA51211c932feb32cca00f6dc149edc4392026bedd350b906860f56529cd03c6a750676172a0915d7f1a256753dfc55e90de3afd8c1302ddc3f1b467c6d0ae436be86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c71aa60f4975a17fc84568cf8fc910f
SHA1596f3ed34a0e8dd683c0826e2f7742180da4b775
SHA25639f2422f5e3ef7ca95f536645d5d88aa35f6a85b6428e831b84cf1b82d48c97e
SHA5122903a2bfcb6694f5540415916d5da1f09914f1a42d4a43fdbb6934209d792aab4e808570e699f1c9ccfcb2a678d950ebedc239e1596c6ab4632083c4acf0c63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5517f5ae2ab5249e4e81a726a10a49d38
SHA1d2e5bc105e303f64b4006892933e870c0843fbb8
SHA25647179b7625eec4f20829e2601b497464de224f4ee04763543a735185953afe0f
SHA5127888ad4c9fdb99c00195f11a72f6980abe2d6fcb52a0139af88a3e5d48ec076fb843256f02608a0a948d97e0f909f050767d10d1771267d93f383684b4bf1add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583476f923a1414ec83050789db20bd38
SHA15fe420284ffd716507102399c9b6753c999e2cdd
SHA2561ba2de3a7a7d8f382a1fd6ebe7ada1e5394f15f98eef654076dba2872c63766d
SHA512a7ce3b6e110e06f9ba796aa64d872357e2c6df029ae8717936a83312de009c5e65d9729481d4f7565e159f8ce3fee60fd12dbf25c6861a775e1ba0fddc4c4da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e24f6abeba0cb27b93ccfc6f30e31d0
SHA1cee088396d138f65ede876d8a4c347b492e8e156
SHA256743db12970b7c1b599cbd4a231ccc72081a5fc621e296574ef2469e8e74158a8
SHA5121b7cba14a9aa5a1d2bfb5d8e30ed54db4ef5fb42aee51b99b512db2f92ab68e8017198ab8aef6870d3ed7f719f278433ce46f5f54d3d05237b4043669070627a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a8d0cbca7a1d4f33c4278358a442251
SHA12b6697e40c74c7e5bbfeb59a393a862baef34c5b
SHA256f6a09056eace223a318a3f27ac2ec389be52a9f804011b1d287766126839d549
SHA5128b18b9fb996047c18abce1cb4d1d4e24d8cdeadf8820847bce73cac27e21eb58a06863ddd8b63a019b8551adc21f9421062ca5ded773479ecd36412fe577c983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ac75c778f963100b8ffc1bb2f3e46d7
SHA1198d1a3f365205c3e5fa80306174442a1e3d0e7f
SHA256f4241836a11a5cac6b0115ee06fab20f123138c251ddcdc437bb4f47ee39a737
SHA512a49aace5e501037e8f503952150d78ad80868e6b2292410bb5b31ff2f97968adb453dfb1355df352cf49f86f8a7fa940154d129a261962ab8abf7bf50ccb14ba
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a