Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
d2d1a74cc2b52be2d3564d3f590dda99_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2d1a74cc2b52be2d3564d3f590dda99_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2d1a74cc2b52be2d3564d3f590dda99_JaffaCakes118.html
-
Size
150KB
-
MD5
d2d1a74cc2b52be2d3564d3f590dda99
-
SHA1
00c0c774c9ae080d7554d20c3b7d59015fb6d8c9
-
SHA256
c2cda5728fdf4e9f6471d88e07a7ec0fa783becb79066b55911eb8f03b26bab8
-
SHA512
634d8ab381151eb6c29efecaf08d9fed37e6947f674b4f72a6928ec126f355b2ea5d8a3cf2f7e07f326bc4ff3252cfd878000e98b890af8651d8b0ea7d180eac
-
SSDEEP
1536:iaRTOIPwitKaj8qyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iYAitKVqyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 920 svchost.exe 268 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1908 IEXPLORE.EXE 920 svchost.exe -
resource yara_rule behavioral1/files/0x002f000000004ed7-430.dat upx behavioral1/memory/920-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/920-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/268-449-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/268-447-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/920-444-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px7253.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431904345" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{626E1DD1-6D5B-11EF-BA5A-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 268 DesktopLayer.exe 268 DesktopLayer.exe 268 DesktopLayer.exe 268 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 2792 iexplore.exe 2792 iexplore.exe 1012 IEXPLORE.EXE 1012 IEXPLORE.EXE 1012 IEXPLORE.EXE 1012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2792 wrote to memory of 1908 2792 iexplore.exe 28 PID 2792 wrote to memory of 1908 2792 iexplore.exe 28 PID 2792 wrote to memory of 1908 2792 iexplore.exe 28 PID 2792 wrote to memory of 1908 2792 iexplore.exe 28 PID 1908 wrote to memory of 920 1908 IEXPLORE.EXE 34 PID 1908 wrote to memory of 920 1908 IEXPLORE.EXE 34 PID 1908 wrote to memory of 920 1908 IEXPLORE.EXE 34 PID 1908 wrote to memory of 920 1908 IEXPLORE.EXE 34 PID 920 wrote to memory of 268 920 svchost.exe 35 PID 920 wrote to memory of 268 920 svchost.exe 35 PID 920 wrote to memory of 268 920 svchost.exe 35 PID 920 wrote to memory of 268 920 svchost.exe 35 PID 268 wrote to memory of 2980 268 DesktopLayer.exe 36 PID 268 wrote to memory of 2980 268 DesktopLayer.exe 36 PID 268 wrote to memory of 2980 268 DesktopLayer.exe 36 PID 268 wrote to memory of 2980 268 DesktopLayer.exe 36 PID 2792 wrote to memory of 1012 2792 iexplore.exe 37 PID 2792 wrote to memory of 1012 2792 iexplore.exe 37 PID 2792 wrote to memory of 1012 2792 iexplore.exe 37 PID 2792 wrote to memory of 1012 2792 iexplore.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2d1a74cc2b52be2d3564d3f590dda99_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2980
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:472076 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5babaeda9b9fc5d365dec4ec110fc7905
SHA1de268a7720d82f85239e99c440d2d7a39174dcf4
SHA25628ec21c0f4880f1b7c6e8ef80e1e93dbd9cc0efeef5226e52c4306db95466adb
SHA512fa1bfa3c741f16324cd320a34fc9cf7cb6f6b1e02c543cfba30210ec3db74e94263cd1c7f9e0b6a000a6caf5c6f9433992aca5fc1f58c0d66904de7c73319a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f47153f1e5a8c3fa271fd6d5c1c8c179
SHA116e18b90a801f1d51b9961d18b4e51d11dba14b0
SHA25628a5cdaf8290663af6305abed9eccfa097db7b87d759a134b73787445607ddc4
SHA5127106e5dfd263c7f059af0d8972f5cf5c9c065e3f921b918ce6fa1e840d5c52e93d5081bfdf39059eefa56ce8a2695d37a503d659574d8c28940467402252551d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517034aaedd95e8b29cadc2214092962b
SHA1b5e9e1a20f1cc6d9f7c9f8e293c6b95b6830d8ef
SHA256d4c1e7fe6cf9a025ee586514de6f04cfa3146a21f700b0d89aecb18b69d515e5
SHA51243a7e75e27e7d67f5dba76594ed6c84fffc60046060aa3660a0021632b2bfd3507afbcbeee2f9daec21eedac87fd35a638213c693acb8b0f3d7b85773615d4a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efca0f02aad65c6d1ce031cd7d11fed1
SHA1d1022176b6514f52b60e9b67fd92559ae499b0a9
SHA25690013a4035d64ed011047a120670a12ea366e6c878ae2dab6831e24e644cb387
SHA512cc4d47a214ab168ea7a7ae39ccb2c46c4319fba0e4e289ba83cb405c8244c2dd1c31d6a8ffa5be971ee3b07b275c30b42ce68ddcdf1f8075bdcdbf40674821ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0603e51cac07defd2fae10065c37f0
SHA14a5666b8a6fc7e092119ddf4de954b6147939c0d
SHA256d8602e86c897670bed093e0ee75906fc252aef2737f6e6ffb03b0ca381ae2d83
SHA512605681717558fe420aea67d7fd4f7efc383088ac18966b023fa7a9453269e99e5102cb5eaea2b708aded2aafdb4e61ad58386ea62f0db0eddac0ef9579b7d654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500074abf676ace75ea9b62754c9205db
SHA12e01c4f38400ab970bec38a6ee6acd2dd35911c1
SHA25633267d0f184d83a423d18b33a19238eba189dec622447d0298c609689c37cfbd
SHA512bc68cff6f62380a1f80356d1176b04de6c9d57df2b5881effae89a79974723d1fb0f732bf57a2ca08074b13a3a1bc504cc274afec495359cec460de91a4ed4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55186bce33910b521076c81ceb30cb86f
SHA1b9792d4f2cc2fb3f50832c93df1f9ef615d99166
SHA2564364de0a4c840b74aab49e429a6d7105b8518e61d2764442a978d5597a26c154
SHA5122fa1f61f59dea396cf37255538183a5a0244da2947e85001acc2d47c4fb9a972eead1f0fb9f63db836520b595eaaa0019b87d1f3e0e01bdeeae70b94aa1fc2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5815a3b690319ebaa44959ce68146c861
SHA13762ccadb394114618b20398e5392caacc31f3cb
SHA2569645cdbe9aa0d38660e46e10e199e757c1a3b200a3fd887278a6956b2efe5aab
SHA51212735a55e5b38d596e1b4a72d6adf58956aa380a7133b9f8d13fc853d84c9d6fb3887e358d10319740059cd2726955b649832b42175d049156e77155929928f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cc84fde4ea4c1dd59a63e66fe9b00fd
SHA19e9ef47feb2d9948d8eb586fc0cb0c0b0698b274
SHA2564bf6266f7d615ec812f0e8f86355cc4cb3a6c046d82a708019a3fcf513d96791
SHA512056bf2282a1da1e6f4a51fe45e4ffdacf0863aeb0f9b3f29718e1d6d36a8db9ad3213edf66b1afb06d576383abb7fb610985706d668eecb97715f773a8f95e16
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a