Analysis
-
max time kernel
137s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
77db41d7b61527b30f2dd2263a17fa14_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
77db41d7b61527b30f2dd2263a17fa14_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
77db41d7b61527b30f2dd2263a17fa14_JaffaCakes118.html
-
Size
125KB
-
MD5
77db41d7b61527b30f2dd2263a17fa14
-
SHA1
0fac77dd9c541169db6151d27d594ab16b4eb836
-
SHA256
b762e8dd240dc2fd06341e96d823476f78fb995d24f3c59816592d6caae4aa4e
-
SHA512
4516e0c99853293bcccc8d4c2ebc4e4daa06901f1f5fd98c5c25e2a6d30367f2bb0d06ff520b5d3ce1e81544b31b69a753f69be01d51c355f307e6e19a13fbc5
-
SSDEEP
1536:3NfyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:3NfyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 2800 svchost.exe 2512 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 1996 IEXPLORE.EXE 2800 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2800-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2800-8-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2512-16-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2512-20-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\px338E.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000003946b12cd1872effba8c2e0ccbc4aa154692647e67310f454dc299f89c48f26a000000000e800000000200002000000093424310379981ebc5ced05558b80b7908fed883575f967edd2a5fdd08c5ee262000000070b65a31dc5c87fd9e50acc2f54b6f04b2d6aeb975f95866af4850dcd48393d64000000075377de308a7a71061bfb991c00b7cd46f08f321de612e2b5f55a60cccf034abc0f338626656a8a4e98334dc7e9c66bd66abc6b6a5acec469c349b8136a1fd7c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79E34D61-1BDE-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422944649" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b095dc8debafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 2512 DesktopLayer.exe 2512 DesktopLayer.exe 2512 DesktopLayer.exe 2512 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 1684 iexplore.exe 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1684 iexplore.exe 1684 iexplore.exe 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE 1684 iexplore.exe 1684 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 1684 wrote to memory of 1996 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 1996 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 1996 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 1996 1684 iexplore.exe IEXPLORE.EXE PID 1996 wrote to memory of 2800 1996 IEXPLORE.EXE svchost.exe PID 1996 wrote to memory of 2800 1996 IEXPLORE.EXE svchost.exe PID 1996 wrote to memory of 2800 1996 IEXPLORE.EXE svchost.exe PID 1996 wrote to memory of 2800 1996 IEXPLORE.EXE svchost.exe PID 2800 wrote to memory of 2512 2800 svchost.exe DesktopLayer.exe PID 2800 wrote to memory of 2512 2800 svchost.exe DesktopLayer.exe PID 2800 wrote to memory of 2512 2800 svchost.exe DesktopLayer.exe PID 2800 wrote to memory of 2512 2800 svchost.exe DesktopLayer.exe PID 2512 wrote to memory of 2540 2512 DesktopLayer.exe iexplore.exe PID 2512 wrote to memory of 2540 2512 DesktopLayer.exe iexplore.exe PID 2512 wrote to memory of 2540 2512 DesktopLayer.exe iexplore.exe PID 2512 wrote to memory of 2540 2512 DesktopLayer.exe iexplore.exe PID 1684 wrote to memory of 2532 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 2532 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 2532 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 2532 1684 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77db41d7b61527b30f2dd2263a17fa14_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2540
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:406533 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f02179c5cde85e17baff8e3d442152fd
SHA1e2efd1e06cc4d3bdfea50bfb572a088c3bc8265b
SHA2566fe778ee845cf6dd90e72b559f854fa2790b8c820eedba6dd1971e492ab27ff3
SHA512d6503ede5ca9a419abdd8538834642abd9f2c7c6566b00ce35c31840465e2856289e5abf8a9457caa9ca205de911852b7559555995e482644abe9eb3d895c9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f15694d5d55c266c08b641d468a724d3
SHA1c563ca62a25681587775f0a7036a5447f2b89ab2
SHA256963d157d0bae1b78909f1332c3e4cef6efb46f3ed67d7dd537acd106cb8004a4
SHA512cb54d759c2c681b7715b799e6dee74fd5db395a3cd7d4ce7717f4d85187ab646e80f8633de9eb48baafc1ab443d513d47b95a130ac6ab3d9e02004a197ed1761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd9903cc482082a48170bc190f2cf250
SHA149f5dda6f2624155f3efe61cde40e9d9a68a7adb
SHA256b891301063131b221ace7d78a0e07ff6de2914c34134787b5287fe332321b2ea
SHA5126454d7ba381abd2d9a2e0c1c25f4c12f873680e38eb5bf18d42917e08813758ba44b8d407c357dad8bf5d8da504993b78f1bd38f242240c5ba75acb1f199005f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546fc9f3445b74cb64c48c89d6ae94b1e
SHA15e4b832558ecaf786752c75450b0cb9a5a964b0c
SHA256b2ceaad87bcb1e4cf17be03f23be384fd1a97a9be1c58dca28848d3ee46139a9
SHA5121fb99dad0984527b6d3049d2b30f32c8fb5c91cbeaef72b2cfaf864620f88e7f68f3406ab3a073c3111a43e517ad6f5409b205fe7b00d9d00fb5ebdbfef71b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5625d4c83cca7f7efa65f3e5f2ccbed8d
SHA1fa170383f0739ee094fa6c17ad0f282a004dc4e7
SHA2561464131c24128a500343671d5c75098dcf0a2393bdc77b51f352f117b17de370
SHA512edddcfee10d4dda55cebdf7e9941df1b796f55aa4d5f2cab190d83968a8973c8dd864aa5d74723f7482aad20ab92f54aae18ce35ec147f9527914156b1aae13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afbdd1fc1b1cea934015893fa10c697f
SHA121d1894c50f246db38cab107708c62165390b6c5
SHA256a464752f57f6c8c2d60282e020b23e2b11ccb421dcf452608fc032e2076c0de3
SHA51242f812a7b873b18d352b7b04d3b901325b38931faa494505e4df9dadfc5454da2d2999296fe88c0cc001bb41f5a255d83fe81e38c679c29ce7b9b973288ef806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c17ec57f624f789975d75b28f41683bb
SHA14aa3546f03b0e1b3e24feeab87c5ae1c5c7988d8
SHA256ad6d2c7209d79e3670b7573337a9d1141fd68c68e01198f59d62d3211ead5fa8
SHA512bb04c96de5c44d15a5c519ad57b353cde2e650ef90aba300d1155c8e5695fa0fa3ce1203d1690f230de9d07a6bf590c3c7339dcfdd3b2221aa6e5a322b2b62b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a44a50532ed60e1fc9ae9417fce68806
SHA13d1748325bd43c21dc46bff2cbd1e0774bf18c8b
SHA2565526a895edb6c7d1ea6adc301b73439884722460d9c4384b0bf9d82e0e27b66e
SHA51215c9758ee6639cbcc10291402e930af19b3a01e1d88cffafb7fbf443396fde7d817b3dba7f104958ff9fc6cd9c06b8758378eef668e99470fe43267997c90033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e359c1ae8af1022d4a9cb893305526d2
SHA16971b602ca1485017f0d4a782a67074c2166898a
SHA256c3b1661e39babaedaf9972375c6c12c66e28c051a990e11ff6c4578a1664d775
SHA512919a79de78aba3f39849fd3766c641e3383379c9d0ad5675176e4868355ae993e56f56c1c40f3d500f6ba429b989dba9843cdb57aeb76ed4e8c0db6d37f11567
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a