Analysis
-
max time kernel
140s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 11:52
Static task
static1
Behavioral task
behavioral1
Sample
94808170f5f8ccb32f2bb635d436ce15_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
94808170f5f8ccb32f2bb635d436ce15_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
94808170f5f8ccb32f2bb635d436ce15_JaffaCakes118.html
-
Size
125KB
-
MD5
94808170f5f8ccb32f2bb635d436ce15
-
SHA1
283b5081b5945a2c600033c0270431da0c5dc74c
-
SHA256
1691852a9e6138dbcd38e76f56de8665f278de92ef53e326ee7d01d81189b2df
-
SHA512
8d63e78d026dbb14ec9afa76cfb12796fea9e51fcda0b5f271236caf78f1dfb94ac6e090d41983f8fbc89ffa913da62e6c7499b3ec865860263e0cb2b7dbb5ab
-
SSDEEP
1536:pPLfyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:pjfyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid Process 2908 svchost.exe 2784 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid Process 2076 IEXPLORE.EXE 2908 svchost.exe -
Processes:
resource yara_rule behavioral1/files/0x00050000000195a9-4.dat upx behavioral1/memory/2908-6-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2908-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2784-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2784-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2908-17-0x00000000001D0000-0x00000000001FE000-memory.dmp upx behavioral1/memory/2908-16-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px31F9.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9076761-AA5A-11EF-AEBA-4E1013F8E3B1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c4a5be673edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438611052" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000a784140f41ec7608f37b1ddc5daca8c7f428d2d90048de6f93e2498fe6cda1af000000000e80000000020000200000000706186f989adbe88d1959d8a29555c0bcbfbcaf4b3125e6a403483d34f1ad3620000000b37d7bcfc51fd3257ef8a140fa2da48a0e81e0774189f329a3fd890a6400935940000000c3c9cc98ad8f88e960b4cc5aedb4a684d1071f5e05cdced1c4010f113eba0e955fbd74c0fe5a286969d3a9452ee311b5f1f4fa29cdc56d8831a5e437f931c26f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid Process 2784 DesktopLayer.exe 2784 DesktopLayer.exe 2784 DesktopLayer.exe 2784 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid Process 3044 iexplore.exe 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid Process 3044 iexplore.exe 3044 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 3044 iexplore.exe 3044 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid Process procid_target PID 3044 wrote to memory of 2076 3044 iexplore.exe 30 PID 3044 wrote to memory of 2076 3044 iexplore.exe 30 PID 3044 wrote to memory of 2076 3044 iexplore.exe 30 PID 3044 wrote to memory of 2076 3044 iexplore.exe 30 PID 2076 wrote to memory of 2908 2076 IEXPLORE.EXE 32 PID 2076 wrote to memory of 2908 2076 IEXPLORE.EXE 32 PID 2076 wrote to memory of 2908 2076 IEXPLORE.EXE 32 PID 2076 wrote to memory of 2908 2076 IEXPLORE.EXE 32 PID 2908 wrote to memory of 2784 2908 svchost.exe 33 PID 2908 wrote to memory of 2784 2908 svchost.exe 33 PID 2908 wrote to memory of 2784 2908 svchost.exe 33 PID 2908 wrote to memory of 2784 2908 svchost.exe 33 PID 2784 wrote to memory of 2644 2784 DesktopLayer.exe 34 PID 2784 wrote to memory of 2644 2784 DesktopLayer.exe 34 PID 2784 wrote to memory of 2644 2784 DesktopLayer.exe 34 PID 2784 wrote to memory of 2644 2784 DesktopLayer.exe 34 PID 3044 wrote to memory of 2228 3044 iexplore.exe 35 PID 3044 wrote to memory of 2228 3044 iexplore.exe 35 PID 3044 wrote to memory of 2228 3044 iexplore.exe 35 PID 3044 wrote to memory of 2228 3044 iexplore.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\94808170f5f8ccb32f2bb635d436ce15_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2644
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:537606 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5650b061916613f40657e5161bbe7cc19
SHA18db014bec8bef1ca0ca83a20ea64687ed3892c6b
SHA2566e9f9b7a9e6182a2308e1f97d5f26d76f84db35f19173225a08e0689286b6b6e
SHA5127950e63f17f79ae56c2eb6af70ba7f961dad993cd9dfd669bf16525197deb42f174d35f759b7f604fa5b405e985e17430a20269fec3359304cf3895643865635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52223e319fbabb1498d9837e8702dd7b0
SHA182a1889ccb95a6b6edda7613b5ad24f71bada3b7
SHA2568bf00754b15260e3a03b5c6c5a50a0a6886bf737cbf73103e4a1bb80f5232d8b
SHA512a5006e86a65d32cae125fcb2b6cc2fc33cade38cb8b932250461d92ed24cf192e7c2a5bf474b68e56c05ed722218ce4c36c0a1a25c018b2be5867012849bf358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd97d4934893f167ce46d205e8d1fd3b
SHA12f9a36d20b3b2a8bb5074f7eff41bda416e8dfb2
SHA2568102937722130780c1c48ac4642f297326fd4f4e5b981f6eba7c2253a3bb82b1
SHA512586b570d41bfc2f1e6768bf802a596ba96910ba6df74f56c4b476b4cdfda93eab5d841498619f5356e802196648f49858010515142d136f837e583d5c1ac6cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b18fbd39525f4fbe35a5ff6d57dcb6b
SHA1145821c573cc1b4db7185ea659b872e5ea18c47d
SHA256108f6872746787a3fa1ef112c608c286342d2e99602d2e9910b3f5bae0161e0f
SHA5127067d13944cc8bd4fbbabeee91e2268296dd5879b69b4d6d48043d81eb5449bf5a05fbef0a772f537b916c1d70ab4858f8695a3e25e90ec78822c19ddfd976ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba61d5c109be3f55cd5a510effb84327
SHA1b4849ec8862e05c9ef7a282ec41201b61808bcf5
SHA256caa8d4b2e1bf3583ea6461a43e4da591a6dac5f5db7294312c0566f34a8df0f1
SHA512b64b61525092c3cc2bbd0ef3a413272dbc1b39e14bdda13adcdb6da51bf2613a40cc9e8fe035922da6cc4c22c192fcc614e712cd123bad6e4e28a846d5b2ed67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584015d6e4d8bd2a1a34c28b718889733
SHA11b9c9b3c119293f35c0c99ced0e3881063e71ea3
SHA25622197f39371fc722e9e6dfc547de67b541f3481586860905f5cedf10818fb7cb
SHA512e0f3a737d828d1da75f088608ee9e0fe5aeffe574061165df65ca16468facbb715804fae81821daaf7951f174842e8237811e5ee3da68a8a6d6bbde6c46adb73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eae1b8249d88fca3930f7bc90df975c4
SHA17390aa619cd402d3cd7094a6642994ff451154f6
SHA256f45b4ac7e08992b9665a4c51b438914f031f4b92147e9232234aaba7502778d8
SHA512a23bf8a8af04e8593c7f7206c69dd5ccd715797680062bdcb887b9f925bbf6efbdb7c2f0cc994c115c5d7311856a38926247e0936aabf5c8941d0876da72facc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59255a1e4db3252cb04396df4c414aeae
SHA1e6dd8827b6a7f50909eda8fe8d756a0c331e6a46
SHA2564c6f89602ed1722f5410ffd17204637da255b1825136b6c217121980e7d43223
SHA51299fea63ae01eae1c548596395b58068fd393e170c7c2ca298784ccaad863e1a65870b154ef096a070d6c46f366174c369a81ef23e51136ce5eabb6d33e17c14b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9fb79421c7474d77a24ab489f693e23
SHA1ca0935210639e9adac37692b719b4ffac1e42658
SHA256353eb472ffe322c30229c765813b08257b44e983e1607a525e63636f4026a63f
SHA5120b2c1ae84ef51a6f765fdd3502b285bde1433253fcf45f8c06311a2ae6475d2f3c604a63e222fcbca3b9281451a109eb54cfcb8908fff64acfbe499c2627c3ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c34b141f3cea7f7f1487bf0483972b
SHA1f8b06166e01e60fa9bb04e340c79a37756c0f2ac
SHA256dcb0c2cba057b2fbacb56bd55dd86ca7785bbbc61fee34b9006f547bf07eede2
SHA512bc595f5fc3883494601bcbb7329d691da67480d88cc6880b0afeaa488bde0b8c4f5c10a62480992d1843432c0e63f5ba758a967de3e27bc6f8ee9a6396cbdbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c623c4c5b732e29b3675bd25a9c97503
SHA1e1ad6afe30a6d5c47e4c7b24c8b87dc75d0d5d33
SHA2563fefd88f62ef958ad8db3a7123066293b949ee6acd42d3aa400bff4a54f528c2
SHA512f45f2c752ea8da875bf2dad0d061917a5d4f59211447b83330ed79bc7cc8a65ef06bb61397dd6bd443461617b27e1f4990e749c1436c785600d52919df831982
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a