Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
6b36005dfe154fdf3e1f1bc11c396a7a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6b36005dfe154fdf3e1f1bc11c396a7a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b36005dfe154fdf3e1f1bc11c396a7a_JaffaCakes118.html
-
Size
151KB
-
MD5
6b36005dfe154fdf3e1f1bc11c396a7a
-
SHA1
9030c51f6fbb9049fa90b95d0c92891634614177
-
SHA256
25b174f51225c95b37c2eb77c31e3cad04c97f09d7abfb4896d5f34c04ca8650
-
SHA512
9af04f8e1850b0eaa370b72e735a800a36d18b6bd74c3ef67e2f3c86be988e8d9498a8ffd9e99fb87b47bf17a93bde61b8ea9f9d91ac307f3cd5a62cbaa54395
-
SSDEEP
3072:BnEkvHcZXknJPmyfkMY+BES09JXAnyrZalI+Yqzh:ZjsMYod+X3oI+Yqzh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 2532 svchost.exe 2992 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 1720 IEXPLORE.EXE 2532 svchost.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2532-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2532-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2992-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2992-16-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\px8BDB.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000018d6c63faf913af56e177fb7e01c1666f678da99b287097b1ed2d72eeb651f55000000000e8000000002000020000000914e172f6181fbbd66b9cc9f9b20ea948fbc15f750fa7796c5e25d3dfeab52ec9000000012fc069086c297722740dbb06869034510df7d78c4c602ff5d0c92e4ffc65bd328d432562b4ca4fadcf3dd1437ef4d7d0deb840a7c0fa372ceaedbd6035abb916de93d97063d4dd2315a95b63c0909904932cd8c0884f04e4950500a23114e9f4a3b8b063afd14292f066f79ee48f4a9eefd048be68975edd2266322370b59de022e72c43b630b6c0b82aefa7fca16274000000056f80aabc2edf118e86bb1cf60800cf9e4dcdb60966f8d0d8f121e3f92bbd99cdc39855c00faac92063a5167acef8a698b0bf03ee3affae712158a126ef8ccce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422635684" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000093740c198001082e8b3f5cc0ee7e2bc57371626c9214d1cffcf80acb2be2044000000000e800000000200002000000038d6473218d7311ec5551b8f54d0c929b1d2480365ae95f3f2046f0160cd89ea20000000dca3a8970822657be8744d24242d86cb9f98ac6551b84814b1cf50c46e4f86c040000000cff7299f6e25affb810961236901e3cc86d5d7b578a2b7f4db965f5cd9d33b34fe92b07e1c00e21c3500cf4ad432619c6f8584f29a41193e0ddecf750337bb26 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c3180c1cadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1CF7FA01-190F-11EF-965F-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 2992 DesktopLayer.exe 2992 DesktopLayer.exe 2992 DesktopLayer.exe 2992 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2176 iexplore.exe 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2176 iexplore.exe 2176 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 2176 iexplore.exe 2176 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 2176 wrote to memory of 1720 2176 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 1720 2176 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 1720 2176 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 1720 2176 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 2532 1720 IEXPLORE.EXE svchost.exe PID 1720 wrote to memory of 2532 1720 IEXPLORE.EXE svchost.exe PID 1720 wrote to memory of 2532 1720 IEXPLORE.EXE svchost.exe PID 1720 wrote to memory of 2532 1720 IEXPLORE.EXE svchost.exe PID 2532 wrote to memory of 2992 2532 svchost.exe DesktopLayer.exe PID 2532 wrote to memory of 2992 2532 svchost.exe DesktopLayer.exe PID 2532 wrote to memory of 2992 2532 svchost.exe DesktopLayer.exe PID 2532 wrote to memory of 2992 2532 svchost.exe DesktopLayer.exe PID 2992 wrote to memory of 1668 2992 DesktopLayer.exe iexplore.exe PID 2992 wrote to memory of 1668 2992 DesktopLayer.exe iexplore.exe PID 2992 wrote to memory of 1668 2992 DesktopLayer.exe iexplore.exe PID 2992 wrote to memory of 1668 2992 DesktopLayer.exe iexplore.exe PID 2176 wrote to memory of 2560 2176 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 2560 2176 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 2560 2176 iexplore.exe IEXPLORE.EXE PID 2176 wrote to memory of 2560 2176 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b36005dfe154fdf3e1f1bc11c396a7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1668
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:472078 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52f76af9e7a0d595adef5c7020d2993ae
SHA1ecef9f0ed0e5afb47da367b1f4b44ee9ca10a582
SHA2568210a1e2925e0fc98da9b7186055d553d0e9f0cc1e0ea234f08f65302c51b402
SHA5121195f16c8a25170846f72b513be80caf96e1c6167f959d3f27ec5703387358b9ef05c2cf238bc8ba48f4902a5af09e0655a70b4507df24c5bdfc513b9ae50b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD567a4e568eb5c19ab1d30c976226a94b9
SHA173dad65e8855dd275fc828a9dfeabdf928f55218
SHA256a4d6d90223e864b4cb0801cf7bf3f76032bfd1eb38901dbeeb13d5bde6289e94
SHA5125b7ebe1f328ce66d53696c06a61b1b8a7028789bbf7f72685eea1a8a5e1c41d9c75e48e8eb706e7225e7aab1074e799f9c259372d2520430e4604339add3e1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51d442b8f7ec81e8b7f9c308aaa6191e0
SHA1fbadc24e00a33581c016e68de6bb69bfed7b5617
SHA2568b50125c32e72557a8e5fa166eec7622752cc02487b3cf41130aa3acaa486204
SHA51242cabd128c578677f46ec952771c9cecba22d9e8c2dbc3c6e712d61fa7d32a4677c22c0e4101df2b83cc8ed0967069db34d04518095fef80f1b3e0e836ebba63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51b2dd5b7c7ccbc276dd9599cc7163fdc
SHA1ae8246659a108c702e089bb12aa1a037a6f21862
SHA256d21033440d3f2879e7b67b09241282d490fe9b23cfb1f8d8536d081670fc19fe
SHA512d5d9ebfcb1704266ef920d20ec7fb50a180c67a06d018e9538eca83eddfd895a2d972b6762a38e34259e9233b72fab9a91a340a65884c9b5a66a818da4ca5d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53f0e27c4e02276bd0ec55456224230ba
SHA1c427b7228c9ec32d10b1ca951c40dccded08f245
SHA256a0116121c6885d922832b6bc16f8423f36fefaa5384f5aac25b51678af93e87d
SHA5128d915b3b2a29eb2c715323298486448c513e41730275c38741b894ee994da527fec6011838cb5b8433a1b5c13085586774812993099147465afbc5c63ff9adf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b96957115c17d0fb3bb12e2c7630548a
SHA16c0e44186fba48fdbd64347636389258eae59183
SHA256398021468df71e1c29e33cf89fc34e81858271200f533ad211fecc481ffb46e3
SHA512344d8751e2adc2623c166d7cf3eb99247d6540e59ed0927c39a65c19636b18714a89b808e3e53b79cc3f60c501ee906ec4a826d23cc72b99c0f23c62b5bec3ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD570088de842594eb0bcfb3b24e5dbdce9
SHA1fbfaf40e63e80242a3fd708f4e4a6db9c1afa0da
SHA256da3eb3c6737d9a4f6ed3ca7ecef38f06149566369da85f234f74c37b304b7611
SHA512f1b517a33caae2d4b8fdbc03bde68255c00114fd866abc4a8c1bec8c69ceff3f2527c677fe041d4781818f9366e0a75bfacf14cc407d5c3788a45346d3983418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53650befb8a03d33967e71c1c2ac98ef3
SHA113c2bb041fb55a3f02dd9a2266d974324ee05ff1
SHA256c02431d4976a8fe3f3f5e322668514243cd719d77225a2062eb0ebe38edcb290
SHA512c2d5f08c1c22aedc84eb401ad15c719184359ec7e46c8e5672a2012fe6eb712935a9d2ccf8c31a226958cf02b79f726131bc9ba3bc7c9f1770c388d6db92f142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55513b99cace9ac4629aabc1cd5ec935d
SHA1f29b6cffd2b3738d3840d8074657d111b24d31d2
SHA256e8782b8f382b277c195b4c73392604d58f31049873e2f1915c0e4db5c0c9ed36
SHA51268c75d25bd5ea957cfa07ab6dbf9f6c645475a0e4f2edd5c1a16d0370a00a52f2699a8167dadfc9676fe89e7ecebc1018dbf96ccaef51b353043941fc39362d9
-
C:\Users\Admin\AppData\Local\Temp\Cab2FD7.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar2FDA.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
memory/2532-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2532-9-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2992-16-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2992-17-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2992-19-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB