Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
962073d54024fb1bf979779599f0b86c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
962073d54024fb1bf979779599f0b86c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
962073d54024fb1bf979779599f0b86c_JaffaCakes118.html
-
Size
157KB
-
MD5
962073d54024fb1bf979779599f0b86c
-
SHA1
bbc73f34ab313ceb957157e8caff61ca33277d8f
-
SHA256
c0d6b3d2b3ca7e9995228e0ca283b576084569b701f4f19cd8d530874ef20397
-
SHA512
86e1cd65a060adb20e76096d9b0c9c3998d0682196630e50a5575a726a4c5d94d3a251e331059ebc249a3b1b2da0bbe0b40c12402b773a6c50ae6e4560367052
-
SSDEEP
1536:iORTfMaJwXdwYCpyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iEtdpyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid Process 484 svchost.exe 2492 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid Process 1624 IEXPLORE.EXE 484 svchost.exe -
Processes:
resource yara_rule behavioral1/files/0x002a0000000173fb-430.dat upx behavioral1/memory/484-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/484-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2492-449-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2492-448-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px9A7B.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DesktopLayer.exeIEXPLORE.EXEIEXPLORE.EXEsvchost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Processes:
IEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438630658" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FCDEB01-AA88-11EF-B439-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid Process 2492 DesktopLayer.exe 2492 DesktopLayer.exe 2492 DesktopLayer.exe 2492 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid Process 2156 iexplore.exe 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid Process 2156 iexplore.exe 2156 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 2156 iexplore.exe 2156 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid Process procid_target PID 2156 wrote to memory of 1624 2156 iexplore.exe 30 PID 2156 wrote to memory of 1624 2156 iexplore.exe 30 PID 2156 wrote to memory of 1624 2156 iexplore.exe 30 PID 2156 wrote to memory of 1624 2156 iexplore.exe 30 PID 1624 wrote to memory of 484 1624 IEXPLORE.EXE 35 PID 1624 wrote to memory of 484 1624 IEXPLORE.EXE 35 PID 1624 wrote to memory of 484 1624 IEXPLORE.EXE 35 PID 1624 wrote to memory of 484 1624 IEXPLORE.EXE 35 PID 484 wrote to memory of 2492 484 svchost.exe 36 PID 484 wrote to memory of 2492 484 svchost.exe 36 PID 484 wrote to memory of 2492 484 svchost.exe 36 PID 484 wrote to memory of 2492 484 svchost.exe 36 PID 2492 wrote to memory of 1764 2492 DesktopLayer.exe 37 PID 2492 wrote to memory of 1764 2492 DesktopLayer.exe 37 PID 2492 wrote to memory of 1764 2492 DesktopLayer.exe 37 PID 2492 wrote to memory of 1764 2492 DesktopLayer.exe 37 PID 2156 wrote to memory of 2428 2156 iexplore.exe 38 PID 2156 wrote to memory of 2428 2156 iexplore.exe 38 PID 2156 wrote to memory of 2428 2156 iexplore.exe 38 PID 2156 wrote to memory of 2428 2156 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\962073d54024fb1bf979779599f0b86c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1764
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:472081 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c057cfb96789ee198820d771315163c1
SHA193477c0bfca4e4bdd0b39587673059e331c8cd4e
SHA256001e184c1a63a28edec8c14caf5d705d6a0a1a87e222cc138543d34cbf6d81f2
SHA51254a4e79efe9c5e26e075a89905aaf05d02814c7cd34875d79d30659f27502f28f4cb1a59db0c55827ec2153c585007a018991f5b11bec4604ee085f167b4a2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ac16db2eaa8fc2d9e7262dd55d5c62
SHA1cd093ff213a1f21b4103596830766ed6881c4a7a
SHA256ecb8e5b2637cb27c3197c60d2463ae66e574405f3d47a56412a7dbf6a8d8ada2
SHA5122da8cc8631056f358f339f84a3f9241055377724ce09612aaeb71357f853d097ad9e61ba4d1f798fd15651c433afd518cb4e2457f95f3a828db3e8c5e09c5be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352d2127bd7174a21b4cad62226018af
SHA1c850e61e6a713686bd6fdbec2c19f9ff04558f22
SHA256d7c2cb19d2a1f0c884b7051a23e2f9c52972d98841b68d3a170fde9f6deaaad8
SHA512c97bbd28b19fe659e453119201561ba9704104cbaf6f9a5c76aeeb8469ea6931c0f77286698e872a841b45e3e59f8a3bddb44f2a71e799b6416b6dcea4d03ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24ca8c882dfdc73a7686fabac3656d8
SHA14f6e5f17bab91020b0fe2b9fa72211fb9c9c25fb
SHA25689633642b33ceaee494225c2ed1a1ed826a596eaa4aedff9cfc10f0082ec5e9b
SHA512dcf3317a52863ae2020554f0087eeedae6582d26db6d0b3dadec4a1009715ef01b53d24ffbfff91318e59bc24086c39c12fb93340bbc310c19194d9f2d0a59e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0fe5cea5ccc8f86d1e6cac957ae545
SHA12e53d2a975961950d1ac08a5e3564042cae9802d
SHA256c60e7d96a7f8f3eb663c80ad02e3fb98c03bd340be221e8b0c9905ba0e8981e8
SHA512700cd8aa18b613e078a06616d62c7b75e46c33fdf35459e24f490b49bd9fd805df374f4b50898366553bd3c1397c7d442e675abdf7c3f5b66ac2b64fe3628e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a041e64136f79c825f58bef5ece9627
SHA1a084d8c78f0940dfa8808dbb6425581f93d38fa8
SHA2563c0e93f1a17ebd7ebb7382c559b067fbaf3ab633e15c6f98cd780fee95b62fca
SHA512e55074e4ef970e4f28f75dd2021665966abc4fe1a2522bb2843882efc9064c57cca956d0a0e0335002e6b41f9b00a4bdde4c846e0fc41a3b301b8136bb3e6852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1580c2b0dd8d1f247605ca39a65a992
SHA153928dd9adcdd75ccbef79e8208cd4f728de6604
SHA25668e8b42ee9c714d047e185bf23147f8696157ab4481504c9aee0d76fd5c79eab
SHA512756f0a3400bebecb1d5b1e052d450f289dd10fe618422562a3e547e0bec47d563582271f922361fc192144fb2b4eb589dca57b3012f17aff052f06ebc39779a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593084835952c2c8afccd399f4612eea5
SHA1f1d0e79bdbdab9eb11a02645f024c2fc2577fb4f
SHA2567e6bb42971232b9df894dba16a42935b430ec577df5cf6dd3c9233f234b0febf
SHA51236b62959e157ee8e82c030bc49ff6d80862431a7c13157f9e594877d506bd3668a884efa65c742084419bca4e3e603f1fe16207a9a46c7e1bb3bb6d56f91cbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eb6140a5a2e93c9142b5fd685d4190f
SHA18684a26f98216d45d7802da47cc2006496389e3c
SHA256b58b3ae96b68e4946c03bae9729058e9405daeae360433cfd974bd766171ba8e
SHA51263c346f340823532b4cf634bc9580946f92e595b8e6d92d659bf6b001be15485c943e464a1fb23360544248afc39189f8f550db7673576ac6786d6ddc1f1279b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af48c658392792e3abc2eae7ae3415ee
SHA11bfa52676c60b78ee7770755bb9e5f14eeb66bdd
SHA256b208150f9a12b36719b6d88c0411ad02ec890a5f87a666b4c1d7fd8c556cf022
SHA512e2ca916c3c25207e96f4c5590ff91ffeb79c03f3048a77127cad3cbae7c77586f6ba66b3b1f65f5902cc47904218c0d076b761b809d1764f45fa398469ec1f0d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a