Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
69f9392426c3fa18eb35fa860aaebfe0JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69f9392426c3fa18eb35fa860aaebfe0JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69f9392426c3fa18eb35fa860aaebfe0JaffaCakes118.html
-
Size
128KB
-
MD5
69f9392426c3fa18eb35fa860aaebfe0
-
SHA1
cc8207b136c1290d97658982beb0eaa794f222a0
-
SHA256
e922d0d517eb2a5737a4fbe8bc7204244b633145e90571eadc025c5d62f52b23
-
SHA512
2ec50b98625b046ec62575b7c876c891634410d4e95a47f1819740e30876606e161f851f437f03ebe822c47c83325c3a5d4676fa8af03edcc815845e245fa72a
-
SSDEEP
1536:SQEnupfoyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:SV4wyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 2900 svchost.exe 2732 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2576 IEXPLORE.EXE 2900 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2900-8-0x00000000001C0000-0x00000000001CF000-memory.dmp upx behavioral1/memory/2900-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2732-15-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2732-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2732-41-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px33EC.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{759D3271-1B1B-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422860890" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000002a4970be16e30db1000435e4ce7225d4cb5bb932ac274c7c13935e86a6724f88000000000e800000000200002000000045d7164bb248f901ca0633a7aa5d4f517b744e0d27cd77a20825ef255274fd1a200000005f57b5b48496d3d72fd4e8a6c9c1df91e26050e1423c2a6536ec4d18bc9210a040000000f65fd662aac3eb98820b284537fdeb93d921e1d0028906a081f007a8a7ed64408694442243915bd1828e42e6f94646c9fab62187ffddccd8e15654e40ee91b81 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f70e4d28afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 2732 DesktopLayer.exe 2732 DesktopLayer.exe 2732 DesktopLayer.exe 2732 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2180 iexplore.exe 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2180 iexplore.exe 2180 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2180 iexplore.exe 2180 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 2180 wrote to memory of 2576 2180 iexplore.exe IEXPLORE.EXE PID 2180 wrote to memory of 2576 2180 iexplore.exe IEXPLORE.EXE PID 2180 wrote to memory of 2576 2180 iexplore.exe IEXPLORE.EXE PID 2180 wrote to memory of 2576 2180 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 2900 2576 IEXPLORE.EXE svchost.exe PID 2576 wrote to memory of 2900 2576 IEXPLORE.EXE svchost.exe PID 2576 wrote to memory of 2900 2576 IEXPLORE.EXE svchost.exe PID 2576 wrote to memory of 2900 2576 IEXPLORE.EXE svchost.exe PID 2900 wrote to memory of 2732 2900 svchost.exe DesktopLayer.exe PID 2900 wrote to memory of 2732 2900 svchost.exe DesktopLayer.exe PID 2900 wrote to memory of 2732 2900 svchost.exe DesktopLayer.exe PID 2900 wrote to memory of 2732 2900 svchost.exe DesktopLayer.exe PID 2732 wrote to memory of 2632 2732 DesktopLayer.exe iexplore.exe PID 2732 wrote to memory of 2632 2732 DesktopLayer.exe iexplore.exe PID 2732 wrote to memory of 2632 2732 DesktopLayer.exe iexplore.exe PID 2732 wrote to memory of 2632 2732 DesktopLayer.exe iexplore.exe PID 2180 wrote to memory of 2464 2180 iexplore.exe IEXPLORE.EXE PID 2180 wrote to memory of 2464 2180 iexplore.exe IEXPLORE.EXE PID 2180 wrote to memory of 2464 2180 iexplore.exe IEXPLORE.EXE PID 2180 wrote to memory of 2464 2180 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69f9392426c3fa18eb35fa860aaebfe0JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:6304769 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51600dc6b338b2ff00d99f8355be70aee
SHA17c89608d61a651aac6fa1b4e31fa3962e4e2902d
SHA256d0e3b5b6fca866c24c57311c1f911a60f4d072d9c345f04e0212bf9e51ffb24d
SHA512acbf642df74681aff2b3ef8f0ad9ab5d3db5bcf3b524d963d00af4fb24bd0b09be9c9b8b4a4eeed8b46745fe36174d8127169dccfb16e8c5fb1871cd593c1139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c8d70bf98fec97020a06771c0d178c08
SHA1eed08851a326cdc70a21b9364d19163a02605c82
SHA256de36a0f799531b6614f5430fa60da3ab5464f93c69e91491f99264f3b3de3533
SHA5127d583d34d14ef21e2da859506b884e93d46882e578d480349eee850b0f9b7f5083c2ef0921acd471aa5f92077b12e00c42df17c0da2e156bc3b017b98fff1dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e995762886da8f9dc955e74aaaa898fb
SHA119b6b5f6aa9aa6cd1d41e7a26623b4862291cc94
SHA256b5e7ac95da00b62845ceed146ff92ebd0e6cfdcd9697c4ead47f5de7a30e3c27
SHA5124669a1b319b6d22ec535096b9d8e3cbc83b9a70301daae72aa9691be8bc581984a936fd4888a4dc1daa06986189099876ece9f2c33e56c485094e18f5aa0206e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5963be1e7ba28fda225261c5fb68d5fa6
SHA147a14e26a0b48e4edf84d974d96e25bb40159435
SHA25636179e99420fe2201a8893f02b76739f0bcda41a84058d275aa3c58a06df8e51
SHA51219a81de88420ecb47e6c977ff02796cdd06fd6c61793e9a0d2febeec9e5961480d2bcae65c3526c9459e85521c43282a61915afaa5d72efb11e3cc92231e8c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5733b87d0a25c0c39f80e70c19b6d2318
SHA1828d7873d2d387f9a899d6bdd4cb36430fe511ac
SHA2567727a7c65ed4ebbdb0dfb71f6f439481b4c7b98ce4cc394f0180464f36f5a757
SHA51204a12b2d150b01698a5d45b88403d7fa3da474800f9a302f8a0d1b2895ba4e702c798fbe97fb022650afbeda5ac6b065de8df560b740fcb9ded0c6e581c86f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c4bdfe5611ac9f0566a153c6a4b8fcc3
SHA14b4b72842df9a4ea392fd57d70116b4557a3103c
SHA2567697e03bbb132a8fd0f99f18aa8bea0dc2804cfa9c70e61d4e3d71600ee71eda
SHA5123af0d6f0536fa1f32f61e720988a61dba292c8c89a86a3da73e80d7255242f48bcbcb21e94d94c5dbb6177e84a4f3db2cb761bb001feb72c23d4b70f7e593fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5477a3bf89357a08dbf6da31d39bb8ab7
SHA1679c60d6f40f1ae75829c2557b3a2db1126200d7
SHA256ab9310da5d0e4f09614c9dca7db30c24c7e05045a45819ad3240d27b624546c6
SHA512df365c7612e11f9f712bf40c866195ac0fcbc62054159f75455309a4d8f0a39c1a24d6376700088c0262b0fc9cb85ad5e0e9b55ade4e47fcae26be6e35f7c05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56e6e7bae61c3f724003081bb9ec82387
SHA13855aa6b79236833e2517036296fb9c549e00940
SHA256f7e9c5c25fb29dcc561f6159bcb754acefb9aa86fd85e2d2c40906a32a220dba
SHA5123355bc90e36bc90cfb33959ae9fffc1488170dbd373ad8626f4c8c814f7e2d5fa50a1e461da9276ea84e9960edfb41c984423e45028917952904166b596e9640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59b2d21b07bf8d4dd04b05901e10dc45c
SHA1312b73d08bd8678e0eb782b2c1b393a7e0d27855
SHA256b5a68cc0f4989ff37b6995a3e313db61014d5bd9433b2e82ef679933f458bcc4
SHA5128554be84eae2694989308fe9c12cbb3c54862e37f263b19d705746530c41b424a9c28298d2994970ffddfa057e4fa6ca50696fd1bf6ec1c7d9d8efd6f936e11e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5436399e1e4480de6ff82b4e89f70e222
SHA14bf2d46da9cc78cd5d18325ade38e1474d1147eb
SHA256055218db8458596f6b344d0cc334206f6a5a0f5403e97dc71eed9fb50dc6123e
SHA5120972eb7ba27813c3ecfbe1cca6aa9760471a7211140e570a06e1c4fcedc9988974f96c5e1815ae613be2c14aa7c7538bec25a4e03231f506857fcb304d3e02a2
-
C:\Users\Admin\AppData\Local\Temp\Cab3084.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar3085.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
memory/2732-41-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2732-19-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2732-17-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2732-15-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2900-7-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2900-8-0x00000000001C0000-0x00000000001CF000-memory.dmpFilesize
60KB