Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 22:35
Static task
static1
Behavioral task
behavioral1
Sample
5bd5da43657a5ff7fe8400eba63cc6bc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5bd5da43657a5ff7fe8400eba63cc6bc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5bd5da43657a5ff7fe8400eba63cc6bc_JaffaCakes118.html
-
Size
159KB
-
MD5
5bd5da43657a5ff7fe8400eba63cc6bc
-
SHA1
72d901291b8abab8fb83bc863890b2698efdf437
-
SHA256
416d4e9575bb0e2cf3f005a498b0f926c3420f2494692eed12134e3e8be2ae29
-
SHA512
532e2e9522b18bfe061c216040fb9a1f292467d501c28a80af40482701fdd397911cd32924f6e6367c8e688cfdac7eef2da7360b87480f71d58ff6f425909823
-
SSDEEP
1536:iQRTZEPn8I0LIbI+4yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:i61lLIB4yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1564 svchost.exe 2880 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2992 IEXPLORE.EXE 1564 svchost.exe -
resource yara_rule behavioral1/files/0x003d00000000f680-476.dat upx behavioral1/memory/1564-480-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1564-484-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2880-491-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2880-492-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px9C4F.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{209D9431-1630-11EF-9CBB-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422320013" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2880 DesktopLayer.exe 2880 DesktopLayer.exe 2880 DesktopLayer.exe 2880 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 1760 iexplore.exe 1760 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2992 1760 iexplore.exe 28 PID 1760 wrote to memory of 2992 1760 iexplore.exe 28 PID 1760 wrote to memory of 2992 1760 iexplore.exe 28 PID 1760 wrote to memory of 2992 1760 iexplore.exe 28 PID 2992 wrote to memory of 1564 2992 IEXPLORE.EXE 34 PID 2992 wrote to memory of 1564 2992 IEXPLORE.EXE 34 PID 2992 wrote to memory of 1564 2992 IEXPLORE.EXE 34 PID 2992 wrote to memory of 1564 2992 IEXPLORE.EXE 34 PID 1564 wrote to memory of 2880 1564 svchost.exe 35 PID 1564 wrote to memory of 2880 1564 svchost.exe 35 PID 1564 wrote to memory of 2880 1564 svchost.exe 35 PID 1564 wrote to memory of 2880 1564 svchost.exe 35 PID 2880 wrote to memory of 1588 2880 DesktopLayer.exe 36 PID 2880 wrote to memory of 1588 2880 DesktopLayer.exe 36 PID 2880 wrote to memory of 1588 2880 DesktopLayer.exe 36 PID 2880 wrote to memory of 1588 2880 DesktopLayer.exe 36 PID 1760 wrote to memory of 2916 1760 iexplore.exe 37 PID 1760 wrote to memory of 2916 1760 iexplore.exe 37 PID 1760 wrote to memory of 2916 1760 iexplore.exe 37 PID 1760 wrote to memory of 2916 1760 iexplore.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5bd5da43657a5ff7fe8400eba63cc6bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1588
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:406546 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f745669878399f997dd1ad16d2fa22b
SHA1697c7f08945521475f34183e2bf9b41f91fa7036
SHA2565ae66c50a7f2fac97729a4a71baa990ce29a27748e18f6903a4ea9ac0da727f9
SHA5126023fab24b4371d08ccfe548f1351b8e8d38967c9c74886a5ff2d0abf69522a3c9a54043b80cdbf7ae71fd682129876ee3259f6188027bfb8f227f5fd268b204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a94fa3e6a46327318cbda4442af05651
SHA128002b8394c09d38f68d1e28b802a0b00ffdc212
SHA256d637ee628fb24f0658540a2124c26be6139c0702426c36ec077f0b9d001f5394
SHA5129f34ab7120f105bd3f7ad1c51f992ef931f85a6cd6d831ff42dfcb2eeca01c46c377927e62020ea06add71682bfefe2e8c21afbc1703642a603d894b4b13689f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52570822909160fdd36f09964af051e9f
SHA18ffd7950ac6859d90027eda5e5bc039d7b498edb
SHA256e7a7f4ec8429cac95cb730b4381ec7176957892093fbf88958614ffbc8416321
SHA5127ce0531f0d4817341c9780523c40566348f6f156f015b15ee81cf5c71a59758b3c0625c2eddb4878fad83e531261e69f86ef888a814d7806756e768308ece0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5064d4876bee45700cd65a9a1e5813131
SHA1254a3463774b48799b461f33a96a981ac559a572
SHA256136828c767a3f932031c35f64a1e2881d4d49c860446bb3b26aadeeaa94820e1
SHA512d6c41b5952f2b5aedce49ee0a3e9a13c17e997ba4ee51c2d0e8e7c7f6387e55d42183c78761e135cbbf9c03e847aacfb5d6d28342a8b85bc38154e852c163e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba222dc459c230f2d1e594f85843327e
SHA1a4430cbe5a7106aaf0b10fb7ec4e8eaf24f15add
SHA256093a7093f519f61c5aef5b2ef510ef003bf94541502c296d15a0d34b5074ab7c
SHA512c4e594748a9faf61fc93777564a78798c38db567f2b25733de64ee91d8f38ba8df7bce113c22020b56c27a570a93480629a99f931beacfd04687288c9e3c35a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3487ebbd8ee4231fe5b822419c2094d
SHA1dd0995c781bbdee4cb7b3a30e3b2efdcc962c541
SHA256474087222df3af8e53d1d07ff11baabc9ea73b573e679bd403a6323e569f8f00
SHA5122f3d8f22434f0cc8cb3abef0ffe0d61726b58187f121d530c5cf1cff3b77d938f1394363210b613340139861d61db88ef7f2fa00af0ee2cdf314e2a0b87eef18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a1b7c2b2775bd44007ab0d401f8c162
SHA199002fdc0f08eb1e912e6dcf8abc409499c475c3
SHA256c986c29e8744c5554017e02a9378fe0dffbaa42c0f264c0c519a347510f2a55d
SHA512cae436c5873259859af01559c5a149c8b899e56c75c13c956144e18e2b0276bb3645b574540743e7fffa64b092efd8a847258849396efab01284e754ac007e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579d6e6ebb5baa812bba16e50a29089a1
SHA13368c176b00ffb1a31dc3f520b907cb4e12d79ed
SHA256439c5da8a666148cd03231bfc76e3f98b665b363cb92168b9736c89d799a029c
SHA512e756953b571fa44cd00657500d1178f510c1eacb06c7614ec5c2965af417516f347bf67776eacb5dbe8e95b122f8d4cfe0cc3b0872349ccdf6b5a4cea7178584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59849c6e3b91d87f805a3afb7eea635bb
SHA13173fd7b4d0c2fcf22390d1c51ae4953fcbbbeba
SHA256397d52a6b7c519345f0921fbed8a81f531e8e8bb964f5eb8fd09eb6222526ffc
SHA5125a6f98fb9887132f5586eca00fb74724b0033c66f1b5e744a5029a392e4f52ca0472088f4775590f95f395ed29485872c2f72b58be52fd158dd33308e4e06e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c354cdac61cd826e33a9e8bfed21fb54
SHA1998b4b779786cc8b5d0723554cdee5e26112ed21
SHA2564406c936f10998ad8f940aa238566b746062674efdcd1d617104be4d28d79add
SHA51292022741ab2927f13bf93244e048a296b6da8ca81109cb7a13d3127c47231400866ce0d67d7d80167537ca8fd0e7d22eae8597ee7cd09a0505bded09a20ce324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b8a6677e45a216de50afbd3c462e9d0
SHA1d53a0e3f1056bd8d1f701af64a25df1d6a83fe35
SHA2563663940ed475901e728d05a7d1154b72cdbbaed21fc24b3ebdb1d85acfa8e339
SHA512ba6288324620a2916a750523cdddc49b44c11a0b97746f30b740eb9ca2fd85629c28db933b46001ce682a14af8d3c728a5914f13cad22f68dc2b0872804647ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57236445bec947bf7b118dbe17f76e798
SHA157dfb39917951dfa853e41d8708340b010f0fd1c
SHA25644e7c6820313d97bd33bddf20271527b90eb5216fe519d8d614bc09950e814ad
SHA51290497d516806dc707bc55b377d7b6f214389cbf3cda3af8a9bb86b9f83e88d19aa2887936352077f0c4d75dc29445e3830580e2bcf003298225e5da510bf1b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b713682fbcd0265f82d166c57b23ac0e
SHA160cb3db633f797413ee362737a58e8ecc3ee32d1
SHA256554b1201b93a231f38f5b397d1e3455d9005e4e610ab17d0d86f5f1aa700bb43
SHA512c543de67845b1ccb38f54442623d6ac2ad4ab587622663633fee8792bb94fcbfcc3e8e611463f6f752b4f8a38df9a502741a6dacacfcc8f89481051b94f705a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56047955729090fb5204ecef1651d785c
SHA1950ae63f41eb17bfa1383dc926b25f7b7fb03e5c
SHA2565b81029e0ea8897a89b758697cbad8472ced2ed5cd64b5fe28e9c8ab820d07e2
SHA512428acdc0bec0efe2f42d99570d1935ac5e51c478127c6282fadfb45fad2164b28d82351d89ebe70668fe0b1f32926b07426a967275f3235dd04374e1bb5b6f6d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a