Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
a86113d97e9ee27cc918caadd00e1190_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a86113d97e9ee27cc918caadd00e1190_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a86113d97e9ee27cc918caadd00e1190_JaffaCakes118.html
-
Size
121KB
-
MD5
a86113d97e9ee27cc918caadd00e1190
-
SHA1
51fd972623b4995564b692c816475196a218ca2d
-
SHA256
955ceebf746e10590d17d68e5521ce8370542eb8798b9ee9ac8cb6bd6bd3fa7e
-
SHA512
43e47de8d7ddd36b3688016d51f19de847605c92e2fcfb12f88a646474d345e5ebdc52236a705ac1bec4015516e2f74f79d165c8a38279c7ee3432e8143c7c77
-
SSDEEP
1536:SHc0VyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:SHNVyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 2628 svchost.exe 2580 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2980 IEXPLORE.EXE 2628 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2628-8-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2580-18-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\px12D5.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f7ba3926beda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000e34c9f38462e22a125dcfdcdffbd11333f1e138c78747672926fa6bfda991ae8000000000e8000000002000020000000196c7b46f26c135e4f0b5169688e2e80e831e99dd4dfccd0577d3b0a8341d2952000000061f1043ff9e83041bc44feb95e5c7beda9b335a72e9ae93a4c7fe90344eecd0340000000a2862564dd0514e82be05b0641589f6022edd8d39825749c1c7665d18d47659bee9e7141cde867732965924b60de8325f58048dea64f68daaaffa7f5ecbc576c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424509266" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{624EA161-2A19-11EF-999D-7E2A7D203091} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 2580 DesktopLayer.exe 2580 DesktopLayer.exe 2580 DesktopLayer.exe 2580 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2840 iexplore.exe 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2840 iexplore.exe 2840 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2840 iexplore.exe 2840 iexplore.exe 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 2840 wrote to memory of 2980 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 2980 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 2980 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 2980 2840 iexplore.exe IEXPLORE.EXE PID 2980 wrote to memory of 2628 2980 IEXPLORE.EXE svchost.exe PID 2980 wrote to memory of 2628 2980 IEXPLORE.EXE svchost.exe PID 2980 wrote to memory of 2628 2980 IEXPLORE.EXE svchost.exe PID 2980 wrote to memory of 2628 2980 IEXPLORE.EXE svchost.exe PID 2628 wrote to memory of 2580 2628 svchost.exe DesktopLayer.exe PID 2628 wrote to memory of 2580 2628 svchost.exe DesktopLayer.exe PID 2628 wrote to memory of 2580 2628 svchost.exe DesktopLayer.exe PID 2628 wrote to memory of 2580 2628 svchost.exe DesktopLayer.exe PID 2580 wrote to memory of 2976 2580 DesktopLayer.exe iexplore.exe PID 2580 wrote to memory of 2976 2580 DesktopLayer.exe iexplore.exe PID 2580 wrote to memory of 2976 2580 DesktopLayer.exe iexplore.exe PID 2580 wrote to memory of 2976 2580 DesktopLayer.exe iexplore.exe PID 2840 wrote to memory of 1616 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 1616 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 1616 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 1616 2840 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a86113d97e9ee27cc918caadd00e1190_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:406536 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5507cdec95fbe3503dc5eb5985fa928f8
SHA10d34fefed6f610af0676bc2e454b1d5e01e9d1cc
SHA25604ee4b70d1d8a5e8df365c3fdfecaade84f1f320f6c1064ade04f9b251a397d4
SHA5121a8b3748bb2987d40d4f532b31d0a49ade95326f5deffb1c29b7534fb126600a0b0813efbcb97341abe1ed08da8706770fa232a250192ef13329658defe29b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5eaea7447709e0356f2c6c5b84ec01b3f
SHA1311fb9966409f533acf115e07e4ca03adb15bd65
SHA2561bcba0a74a98437044afd825a6f14b0d30d467f07ca2c186d99a3669d2400f50
SHA5125bca7bff6604ab0e4c2c9cca34b243d63792b758671cd3643545353b654fa3f861d5fee2e05e8a747f23c82513612a91bdcdb2eeea373f51c94f0e1bf454217a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD526d67197cd2719d847d2e0ba6d674fb4
SHA1379146b3adcd02cd0152731fda22a5e50d31a281
SHA25626daf82b680bb6c74e7a76d616856fe122e9b3627a4d84c10e5c4ba1c0ae9aa9
SHA51202cec7f5cf7397f318217e13dad5d72d357521f06eb5ec89183155d329e887c383f7e10a1ac00207614b149b135d77e6bded6c5af6beea92e7a02c0c299d9393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD524ed66054b62e6aebaf977496ff5ffb0
SHA167258f8f72e9f4772685811f9769640cd9ea6666
SHA2569dc75663827fcea687e786d93316c9a6c2c32bf9fc6953b8d058e8c937589ec6
SHA512ffbb29337015f0d96997cc76de33b3dfd92e9a064d2ebb3dfac80a2ade7788676a6c2dcf41c9eb0424dc9d46b5b41d835237c77bbf807128f2bfa0773fb78561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e3fd09f707df062d576ffaaecfb4ca5d
SHA16a2c0539b85979bf3913ed082c2aa2be6b8a5035
SHA256e1331d2e279ca8a5c1ce40464f43b12418f5a8654d52752254cda5291121fcc4
SHA512ba9cbc81f7c4961b0e9790301777deb442504e3437842bfb3725827da4f604856d232031acea2e9d5e75742855adc86f2577aee242360b2a3aa0e0611dd882c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b54f6a56e6274bf30d1e5e6f2d20d0ae
SHA18b67c1b93c0dc8380213b5f043d9e8410555d658
SHA256a53e168498baa1b146df070defd6f5798ccbb25d2d3b1b5ea4ebfadb7d1d6577
SHA512c21da1e3d568bcc1bf140482a7f07bb988aa7e9e49e6e199c98a1520081eab135487a62d2528b8fac9ac3753397b84960240841164ebe1498a094463330a5ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD511d3327023977fa34aa544cfd35993af
SHA1d9cca1e5955af7c70892113fb3d9b7aa2022dddb
SHA25673cc8c747da1d184d2f1b14826f04bb77a0eb1ea9b2dda979876d945456f87dc
SHA51223c38c177e9c140b613ee3ed2d6fa1da7973846abf46c6a9a8d59a01786a74b3bfd03fedbc203d9fbb4e9f372e4d05b3601d07c132515073400e219e47839287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ddbc1f64021f61da536f2295ca7aa1ef
SHA151313a011f2594acbb0d4c169f9fff79687ea112
SHA25605273fdad23a46e4dbb5e723976d0579cbe081a54edc75c51e2fbea2061476bb
SHA512a3deb28f61cd9afeb29beb275820094a57bc7517fa88ae7a84c82502ee96a85dfeb9be8817acd9321e6c40bbbfb68369ee05f9e8eadfbf7d98dc8bb937ad2136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5155a0544ac4625ffa0fff15f673f2ccf
SHA1886ac4824f8b30bdf748e259d280cc22a06a302b
SHA2569cfbd2b27d5aabfd2ad8a7703d1bc770a6ec7878fcd2cf4a3d35bfd9261f3863
SHA512e7aa671800e88bfe2c9956d35be7eb6095fdb9f3fbebd37f143e0f1607055e40041b26c890e5a34634cfecdb15393f2cf206a2c30bd965591220009fdb749b08
-
C:\Users\Admin\AppData\Local\Temp\CabEC0.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\TarF80.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
memory/2580-16-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2580-18-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2628-8-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2628-9-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB