Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
774ff4487ead379921aa7b6fff9b8c59_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
774ff4487ead379921aa7b6fff9b8c59_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
774ff4487ead379921aa7b6fff9b8c59_JaffaCakes118.html
-
Size
236KB
-
MD5
774ff4487ead379921aa7b6fff9b8c59
-
SHA1
335c0ac7250ec2327ae32d959ae42e1600dff537
-
SHA256
d3da66ba60a9039b674eca71b4afcdb2a1f8c6871cbd46c03aa6daca25c96f83
-
SHA512
b296224aa2d1c626c015bea325309eeb2a5cdb7c33c511177089fd294d5738e08c214438aec15444594bd11d7558201a6b96562c5740b0727a5d1ab2b1e1ee25
-
SSDEEP
3072:SUyfkMY+BES09JXAnyrZalI+YSLyfkMY+BES09JXAnyrZalI+YQ:SZsMYod+X3oI+Y5sMYod+X3oI+YQ
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
svchost.exeDesktopLayer.exesvchost.exeDesktopLayer.exepid process 2448 svchost.exe 2760 DesktopLayer.exe 1984 svchost.exe 2648 DesktopLayer.exe -
Loads dropped DLL 3 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2140 IEXPLORE.EXE 2448 svchost.exe 2140 IEXPLORE.EXE -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2448-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2760-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2760-17-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
Processes:
svchost.exesvchost.exedescription ioc process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px6F18.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px2990.tmp svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED228A31-1BBF-11EF-94AD-7A58A1FDD547} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422931528" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
DesktopLayer.exeDesktopLayer.exepid process 2760 DesktopLayer.exe 2760 DesktopLayer.exe 2760 DesktopLayer.exe 2760 DesktopLayer.exe 2648 DesktopLayer.exe 2648 DesktopLayer.exe 2648 DesktopLayer.exe 2648 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exepid process 1960 iexplore.exe 1960 iexplore.exe 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 1960 iexplore.exe 1960 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 1960 iexplore.exe 1960 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 1960 iexplore.exe 1960 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exesvchost.exeDesktopLayer.exedescription pid process target process PID 1960 wrote to memory of 2140 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2140 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2140 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2140 1960 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2448 2140 IEXPLORE.EXE svchost.exe PID 2140 wrote to memory of 2448 2140 IEXPLORE.EXE svchost.exe PID 2140 wrote to memory of 2448 2140 IEXPLORE.EXE svchost.exe PID 2140 wrote to memory of 2448 2140 IEXPLORE.EXE svchost.exe PID 2448 wrote to memory of 2760 2448 svchost.exe DesktopLayer.exe PID 2448 wrote to memory of 2760 2448 svchost.exe DesktopLayer.exe PID 2448 wrote to memory of 2760 2448 svchost.exe DesktopLayer.exe PID 2448 wrote to memory of 2760 2448 svchost.exe DesktopLayer.exe PID 2760 wrote to memory of 2612 2760 DesktopLayer.exe iexplore.exe PID 2760 wrote to memory of 2612 2760 DesktopLayer.exe iexplore.exe PID 2760 wrote to memory of 2612 2760 DesktopLayer.exe iexplore.exe PID 2760 wrote to memory of 2612 2760 DesktopLayer.exe iexplore.exe PID 1960 wrote to memory of 2788 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2788 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2788 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2788 1960 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 1984 2140 IEXPLORE.EXE svchost.exe PID 2140 wrote to memory of 1984 2140 IEXPLORE.EXE svchost.exe PID 2140 wrote to memory of 1984 2140 IEXPLORE.EXE svchost.exe PID 2140 wrote to memory of 1984 2140 IEXPLORE.EXE svchost.exe PID 1984 wrote to memory of 2648 1984 svchost.exe DesktopLayer.exe PID 1984 wrote to memory of 2648 1984 svchost.exe DesktopLayer.exe PID 1984 wrote to memory of 2648 1984 svchost.exe DesktopLayer.exe PID 1984 wrote to memory of 2648 1984 svchost.exe DesktopLayer.exe PID 2648 wrote to memory of 2032 2648 DesktopLayer.exe iexplore.exe PID 2648 wrote to memory of 2032 2648 DesktopLayer.exe iexplore.exe PID 2648 wrote to memory of 2032 2648 DesktopLayer.exe iexplore.exe PID 2648 wrote to memory of 2032 2648 DesktopLayer.exe iexplore.exe PID 1960 wrote to memory of 2656 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2656 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2656 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2656 1960 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\774ff4487ead379921aa7b6fff9b8c59_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2032
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:209931 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:209940 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55102330c9fc29802ccf652ed51ea275f
SHA10b002edf2e6f48bb855e15997e155d2198cf5feb
SHA256093d4a438fc59ea052a9875216e88556a432f401949de105e9f2916b8d50cb20
SHA51257e1119918eccdfce531d9ae3948be9ddb54fc8096e6b0d364743e03e5b6096a64497f15dd55f4bffa73f11bfac5e233a64d91a2fe994e3cad258d4a30d85d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acb764fa7f9b00aa160389ef42fc71cd
SHA11fa3496c516a708a70ca33f58c7e61b3f4412c5a
SHA2568e2a1e88b00bdfbecd93df1d5c0d16031c1d5d1f574386f737e53d9f5bc9f411
SHA5124e720a2ff6b92c6e8133d88600a4fcb63c08a593c89e38c3cb6404dd32b34e29f78df8882831573457cc67febfc4a08549173b0a14159e2699056d2a07b02614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de8aacab8a028edfc5b063f3364fc685
SHA1eec49628b6fc9b6ad79c06f831c3ae3de32d0303
SHA2562c7bec444c210190b8375ebbff365eda1dab55b58db994198bc69455818623cb
SHA512b6c6ec18b22d0726704023eb5bad25e3ceb3a7d7f9af88661e48846efb663e9cb9f575669cba1ea9a615367ccff729fa241ada9c41914e1ca5e22d5c195b4e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a3c579ada455e0e2c097de7f5dbb35f
SHA1c815fce7f4b6ff85d23d4a9c2ffec8bc858f4124
SHA25650590b759c04cc995d3763eed8c15dbf3b06fae9f35656627bd713ee9ef300e9
SHA512acc7283e3a06a4788094fc97d2bba7d30dfda2f06422f864841d7c58cfcb1f7b6ae026b2d2f05787b92707a2b934a7afbde75f9cac146a74520b2ad87af161d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad33be2afccb09f8a4278441c681d601
SHA1b86833cf7710f7724d97ecc26c98e68ecdb99ef3
SHA25642a8d848acd669bf619428f6b91983441f34787101310f4cf02a9b79bb0af259
SHA51211a552585687bb797cc1fecfccc2d6f3dda962bbaa3756319083fec315e777dd62d4c4d132e61cdcb8135879010c73535144b67fbbc6a2b25386fa3ebc270b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5af14c67c99ead707b4ec7945232ef8
SHA128f61b6da6f3677678f7cd831f93184a3473c511
SHA25624a34cb52df097251727ed73bcf34190a6defc224473cc7037082068eaf7c61a
SHA512307c3fb178f61ba0b2f8bfafb8517c1d1db192be0c50365518c45e61d64dcb771961970e9221ff1713eb97807c46993b71050a861677bd82e76ea98efc568a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b59b993ac31aa7748de84b5a52ca38a4
SHA1991c97469892314560553f115478c918b98e55fc
SHA2565a1bcfe46ff187b2742aa1663a8d606248d260b0fdc52a080286c3b721560fa4
SHA5124058868373a494cca421fc9bdf9f0a29d042bcf86f1daa9acf4aaff8afc2bcc7373d9fd82749b9aa1ceb399417fecd3dd465a8341aef048cbb099724174db186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57af7fbd1765dd3f1aac12870ed7e0330
SHA1bf601d1fd43efc256a7f73924655f97ac97ba217
SHA256cbd191ea0f75ea0a101daffae9f51ec33e3e147ba7486cf1d8e657c9c6ffbc76
SHA51293133e1b6baaeea86616a4fc1282859c65b69fee593a012cd6fb70b8be3143d8f0a221ee3a162a8371023ef33d90f37924247ddd86e8af0345d71d9645b2a0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aef4ca8974ac5ea41d73b4d117afdc7a
SHA173fd7afe7e7761025ff2e5849ced760a98961f42
SHA256a527ef3e0e166f7a0d04e19a767f6d7d5cea7bf0560096bce066baa2a65f1bb4
SHA512978fb6dd8e16232de088da327bf83aad2d3205bcfe7c573c141e7475cd62279203a643d16dc08137a16daa75bbf8abd6ed3c86db245c62487bbfb5d3ab37bf40
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a