Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
772f009835d3e3ebf0572d799677dd72_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
772f009835d3e3ebf0572d799677dd72_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
772f009835d3e3ebf0572d799677dd72_JaffaCakes118.html
-
Size
122KB
-
MD5
772f009835d3e3ebf0572d799677dd72
-
SHA1
f6a759628e174e28c8fa57267f8b18c2fda3fbf3
-
SHA256
85a3d6b5e6bf713279ac0aa5c952eed01c4c5d712e39da6cbbb9fc648a337dd4
-
SHA512
bca2fb6c92226ea819e7ee610bbfdbd8eed3267105b4505cb40704066459940188522f1e41425690641d86d0954a31eee49b0ba03ed6f94b4e09a21806f3b57d
-
SSDEEP
1536:SNanRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:SNURyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 2856 svchost.exe 2672 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2460 IEXPLORE.EXE 2856 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2856-8-0x0000000000230000-0x000000000023F000-memory.dmp upx behavioral1/memory/2856-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2672-15-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2672-19-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px36E8.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e9a032c215386cacbe16e7888ac34dc56b5f878ce53ba4f6abb2eedc6667770d000000000e8000000002000020000000ed3447c6dc3e96c0c7ea105cf0617f4b53953fbdb35f44d5485348df0af5c20d200000003b4450d5b7ac53e0368c5bf92e7acfdeb7eb02d97ee0a69b328299fac218b735400000007c886d9c6dd7391cc37e826ffb091145064b6f0c702528a18c18918943e9c8d4b40c9029c9c985b04f046629c8a32926821a2f547ccecdb4af8b2cefdae3e8cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B30442A1-1BB8-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70db6e8ac5afda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422928423" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 2672 DesktopLayer.exe 2672 DesktopLayer.exe 2672 DesktopLayer.exe 2672 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2844 iexplore.exe 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2844 iexplore.exe 2844 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2844 iexplore.exe 2844 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 2844 wrote to memory of 2460 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 2460 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 2460 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 2460 2844 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 2856 2460 IEXPLORE.EXE svchost.exe PID 2460 wrote to memory of 2856 2460 IEXPLORE.EXE svchost.exe PID 2460 wrote to memory of 2856 2460 IEXPLORE.EXE svchost.exe PID 2460 wrote to memory of 2856 2460 IEXPLORE.EXE svchost.exe PID 2856 wrote to memory of 2672 2856 svchost.exe DesktopLayer.exe PID 2856 wrote to memory of 2672 2856 svchost.exe DesktopLayer.exe PID 2856 wrote to memory of 2672 2856 svchost.exe DesktopLayer.exe PID 2856 wrote to memory of 2672 2856 svchost.exe DesktopLayer.exe PID 2672 wrote to memory of 2816 2672 DesktopLayer.exe iexplore.exe PID 2672 wrote to memory of 2816 2672 DesktopLayer.exe iexplore.exe PID 2672 wrote to memory of 2816 2672 DesktopLayer.exe iexplore.exe PID 2672 wrote to memory of 2816 2672 DesktopLayer.exe iexplore.exe PID 2844 wrote to memory of 2660 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 2660 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 2660 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 2660 2844 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\772f009835d3e3ebf0572d799677dd72_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2816
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275466 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52da03b819b7eab8c3cfe16493a928936
SHA198ad04d2f37fd5acee11771fdeb574da2b62a5bf
SHA2569d3462b49b551f827239a61fca83e8fca06a113f774f2c2d0409e62d795514d9
SHA512c7f04aa8cbdd0c5d8cb4149a351e78e7af15970ab20ff1b544dca7b85928c46f758a99a9f9165b6ed119d862f48e5582b29103705fc320dc1f034873d1cca7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4543d1f54d3d9a9fef9277dff710a3d
SHA1213827b486818189b78b6f343c3082c6c53109f5
SHA256782815b5bfc2ca348bbb89662264dc6f35fe09e00e5e9e53162baba83e87be11
SHA5122f47c2ce91114d25169528ab4498ee24118362f15873f2b11069d573728e2f44987df44f18c0b27768159e1444255dc60893c1d2377e3379b937108f11874e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bda89049872bdcd221b2171826207193
SHA156c604673f7ff9992ef315960f036eba7c56090c
SHA25670b5dee447a03490f4aabdb72beb26f5b2458b683ba0e49f46e5ef82a844cd77
SHA5126467b5fc942a566837f04e959416bb5ad6156edd67be93df2aa24f7053dc218cee3ac8c2e73b2610e490cb27c41a462e0540caeb012ef5847ddec3f1c0fc05e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56497c5e038d8b7fead64d574b7f42c77
SHA1c0b77e17d75bb6e599175a887cc26f9de057a998
SHA2562f67f07364ac3e69c91912a929da502e3cf0c867c1645303eaab8d90264501c7
SHA5123526a94b0f36f14a4b5b179b620151c878d235acf6d2ef478b59b5ed634c12e13e689dda353422fe55f4e4d88f7c642910893a713a4460aecaba28fa11415695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5223355c0e7ba02f71a9a290b08ef6d69
SHA12a112d08e9dc564d657393b05ae9ab7aeaf55335
SHA25615cb154e69779d33eaf734219264b98df1cd6442be277996803cc54b234ee9ae
SHA512f2bf0e2517f23aa7b091d68981a83fcc474768c0e5e4983db7977e7de6bf6e22923fdcbca2d88241be3cd4a4cc8398bedef0aaba3e72f632d0f251c5528d76aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cd3a69a05a4da4519726b6c94c922d1
SHA11a188418427bfd6d6e6c58c43ff58b873f6b7425
SHA2565f63801c328816456b74b5a8a6d53075bdd7e5c2c9d6809a77ac9d2f0f7d0870
SHA512eefb0acc6b9d925096db06470dec5a47cc34564f6ab1e36108979e8d2c812a6bae75dc84e69863d4e04c79e8c44af2bdb65059c8f5c758a54d17b2efbacc8d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e17034180a1fd7cb005c296489ca2771
SHA1cce87810983c2d18d4cb9136b3db77477699de5a
SHA256186094cedfb120f0e2a727c5c28aa73b64d1b670ecca3cd902b346df5414dffc
SHA512fea48a5113d5b6b18c81c3bf17785d20e42a6603dfda2e72f2ee96832eb7858301003781d2d9e30af03cb0c19f9a6fa6f9b8f53bf2634561c461da751848d6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d87186f19b798c1a07d4b64e10a0c34f
SHA19b146be92f3cf2554f571627dd843fff514a957a
SHA2566ac14229e22a76e54ba0057a73659aa7bf5712557a9cac2f49c28b42fa30ac9a
SHA512f7a81d0acbcfc09192d08730513b58d3efee46dda34a661fbfb59654a0a28af22c460ed710263c7ddff019622737f18af5f43ba09732376a58cdfc6c80aed239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c9d96fe8ab18b76f556fda3698d0974
SHA1f5cf22979921544ee14744820406f1a66bddfc85
SHA2565efb00652d332087d1855bb6e2e9d25be8e0504a738e695bda7ccbbdd5b63b22
SHA512c00c0b8886cf9d58dd8118ebbe8ead9d4af96608ac0f6b3167222af5f20467bfeff4eae2d322b61783563485297f7073dc1b6f19224b69cbb1b667a0bd1260b7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a