Analysis
-
max time kernel
129s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
68f4f9eb587e1d030d456a4b30b5e0aa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68f4f9eb587e1d030d456a4b30b5e0aa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68f4f9eb587e1d030d456a4b30b5e0aa_JaffaCakes118.html
-
Size
155KB
-
MD5
68f4f9eb587e1d030d456a4b30b5e0aa
-
SHA1
165cbeb561576d8c5f12cf0b5fad24095e598d44
-
SHA256
3dcf0bae25a23af1cbedfa0e9b64f05491e3eb2abdf276051aecb7206b96dd0a
-
SHA512
04a159f42878d08af24caddbb8ee7118a5f7fca442a9eb7c1685626d2adb317d45529ced2ac8efcb175fc109297d9861cad21e7504eeb608ee3c8c46403a55fd
-
SSDEEP
1536:iwRTyZcVtXmMHSeyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iayCSeyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 1712 svchost.exe 2956 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 1704 IEXPLORE.EXE 1712 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/1712-482-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2956-489-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2956-491-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\pxAE9.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422581355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B6F7951-1890-11EF-8303-EAAAC4CFEF2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 2956 DesktopLayer.exe 2956 DesktopLayer.exe 2956 DesktopLayer.exe 2956 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 1464 iexplore.exe 1464 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1464 iexplore.exe 1464 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1464 iexplore.exe 1464 iexplore.exe 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 1464 wrote to memory of 1704 1464 iexplore.exe IEXPLORE.EXE PID 1464 wrote to memory of 1704 1464 iexplore.exe IEXPLORE.EXE PID 1464 wrote to memory of 1704 1464 iexplore.exe IEXPLORE.EXE PID 1464 wrote to memory of 1704 1464 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 1712 1704 IEXPLORE.EXE svchost.exe PID 1704 wrote to memory of 1712 1704 IEXPLORE.EXE svchost.exe PID 1704 wrote to memory of 1712 1704 IEXPLORE.EXE svchost.exe PID 1704 wrote to memory of 1712 1704 IEXPLORE.EXE svchost.exe PID 1712 wrote to memory of 2956 1712 svchost.exe DesktopLayer.exe PID 1712 wrote to memory of 2956 1712 svchost.exe DesktopLayer.exe PID 1712 wrote to memory of 2956 1712 svchost.exe DesktopLayer.exe PID 1712 wrote to memory of 2956 1712 svchost.exe DesktopLayer.exe PID 2956 wrote to memory of 1504 2956 DesktopLayer.exe iexplore.exe PID 2956 wrote to memory of 1504 2956 DesktopLayer.exe iexplore.exe PID 2956 wrote to memory of 1504 2956 DesktopLayer.exe iexplore.exe PID 2956 wrote to memory of 1504 2956 DesktopLayer.exe iexplore.exe PID 1464 wrote to memory of 1824 1464 iexplore.exe IEXPLORE.EXE PID 1464 wrote to memory of 1824 1464 iexplore.exe IEXPLORE.EXE PID 1464 wrote to memory of 1824 1464 iexplore.exe IEXPLORE.EXE PID 1464 wrote to memory of 1824 1464 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68f4f9eb587e1d030d456a4b30b5e0aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275477 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5228647ef61df092c07de185b3e0d85fe
SHA1025faad0f81ea49176761d3d6ebe3e791c9ecca6
SHA256a40221ec6655e427780f1c9e1ebf352e816a4ccf377ffb8b2e872d67519f1996
SHA51202eef5b62cb1a2d30674d8c8434fef69cef9f6da76ea1d62529a8a6e61ee7641d856815c240fc01d2376d593150fbf53f87d93d813aec9c73a88b2b288361b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52bf749348626db80c3a2e8dba804d271
SHA1508e9a3bb48e7e593b983cae0bc32c75a849253c
SHA2569cb803362bd12735d6458091721df0c4bdffe8272780a84922a8d35b441a15a3
SHA51265d1d018a2787cfb43cd45cf1fa550182f881147cbea02e3e681c375d1154dde80b44e7af8ad574b47bf32afb7c3d89f3d3c36431433056bc114812a2e7d11de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fd4e60dc13464b24d61a4d8a382c9b10
SHA1c7ea5778d43e64971ada5ff16fc41ee7bac8b673
SHA2562189a4124ae5b3ee31dcff2dce47d18c01e2b8c9967ce9c843cb3a6baba6d5b5
SHA512a702e457b5d06386fb17e37d2b0ece28aa39e26ec1368870d475d29b43f6da9620a3f218fc84c2d36ba4eb2177447904b5532b806563c54c55e0f47d2970b3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59ec8f0628a9f279e4c477a8e806d3c2b
SHA1b7cc7c6dcd8e8e6c82d0d06d91b187f9c32d7c4a
SHA256bbf94f7b47bcc628e940d1417306be08cf0fc619cdb29e6cf867be6bcce00397
SHA51269aec3642d438bfefc8745fbaa4f36275132caeabd54f0089d0f919b846a09798cdf66fbe6f59238d81e4e6e4fb4604261b707f4aabb6469ccc80bb022a3ce8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5928bcbf9cddd23850f8983da8aeabb59
SHA18143db64efd58f6f425ffdd388e88e64fe133aa1
SHA256ca7485b4b21fac7b37b1f7f5d077db6b34d147575922a2949b45eb37e5e6e6ab
SHA512d729ad821b4d3020ebaad468bbb41d0e1ad82de94a4df697abace028a02cf2d92a9ca768524dd361f7355a55428da978946c1f76c2b9ad9f1c392215639857f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD560f553aaed0615534832f22e2824b308
SHA1798e49df09130bd8140b4a8a43a05f4dd6fb5edf
SHA256fd740cfc0881d1e5d5e266f225871fc65703fd673d678e0afdc71f82183101fe
SHA512d5d3988fa14cc662ba70c405ffb6677c1cd535826413e0ca61992f21aa3613c35d5d981e092fe903068b74119d2b544f94b213a1af9fd4e84cf3e17862f6f8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5141b6f13aa7c512f20eb334b8c3e64f0
SHA1cdf8b6217aa4e6b5d4236aad2f204b7a2c93263a
SHA256b794951836f5e0683fa5474ce06067e34550a40ff27a0d6e53a8255143720840
SHA512545e0d2d55b655869f1cb21fad7be2aea47a792cd7df957d661825a5dfd46ceccafa032465c473bc3e374b071d34c7f7f14c46b730804c8758077c94c3eec4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cc3644488125a1e5985a0cca8c8e7dc4
SHA15e894ac4cd9104bcba74fbba33120ceee3682375
SHA25654d2a9aaaec7d5e03f1615483d893b12c6a94a328d12c0572168769790ef12c0
SHA51299fb875bd632e1dba4414d6f326d275db3306472fc62f981d980d6a457c2aa01d63da77ecbd676d58fe4628c9a760d9ded87a44be093b66c8c6c40b545d65d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c1658df1e000a7e22802339c5204aea9
SHA12f7a4079f1b4d8e4bc0528d0d1ad567cddfa0fbe
SHA25675669336303981699e8714c714827c0345dd2e178889398369a906f394f91703
SHA512238e38f5d99ade3bb82ef635729481989ec3342b5cba9ff770ee6a989e3a2b4a9fdbe165454816c2bf24cda8dfb8211c1d77f1d5dc8911a42764af10e4ca2afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58465f8726ef71188ce6dfd62d2332e17
SHA1bcf18aa2ddf76474f0376ad3e60f574286e376b6
SHA2565fbe9eca88fbdabe072dfce8c6da2636805b3e8e57dc1daae1a2ac5b9f5e211b
SHA512445b316bd081ae81137d757f6c8122615e25852af9c7df014e7ad6110454087545c7751555a3829269bf97112825c26b79334a127a0c0477c5ebaa1d2b1d7e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5084c53b5c97ac5d8a183d243da675d2d
SHA1e3ae130c0de2cb6d16f87b64adc550863c41a0cf
SHA256f6d12cadeea3d69d572c14dea93159b52a7ba0195d3ad68b5650750e81ffbccc
SHA51280d7d3d246598ad4da1c5da07d6fea533dce68622634287711a1fcadeaee0f5e721da1a32924dfc438b964ca6e94f3c1a7432b3630a1bf51669bd8adccc2f61a
-
C:\Users\Admin\AppData\Local\Temp\Cab2ADA.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar2C76.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
memory/1712-482-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1712-483-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/2956-491-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2956-492-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2956-489-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB