Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
d7bad80e5e97ff233c7acfc880f7ca41_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d7bad80e5e97ff233c7acfc880f7ca41_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
d7bad80e5e97ff233c7acfc880f7ca41_JaffaCakes118.html
-
Size
116KB
-
MD5
d7bad80e5e97ff233c7acfc880f7ca41
-
SHA1
c9c39582f0b2560fe892d43b5273e466a6601d0a
-
SHA256
f7147ae3b7e090fe771e69740e5946e331a1a23e0c41bd3ba62ad385e7c8ca5e
-
SHA512
da4f221ea4df61ed3cd1307c6e8839a16b33572e0813e1b6059e149b9db6d3a063f9ea08bb8299f1c9a4cd3351665d638fc9933e46e860cc284d9b0a3c17d8e8
-
SSDEEP
1536:SnzwI2ByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9w:SzqyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2820 svchost.exe 592 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2788 IEXPLORE.EXE 2820 svchost.exe -
resource yara_rule behavioral1/memory/592-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x000600000001961c-16.dat upx behavioral1/memory/2820-8-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxB693.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439833252" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000fbf6b66e5f16947a5fc9d33383bdf7500000000020000000000106600000001000020000000e807cbbffee6f2b1ab79f1c5ada1097dcbfb1e8deff1f4131460d31d58c3c69e000000000e80000000020000200000006300cd60f238d43f129fc437a42295490c7bafd5f65214b036c58866349d704b20000000bb52f7a4963eb3629a046e30406ef2f760e7fc8ad4711825de449258930a86db400000003b3ae5d8186ae9e8180bdc39cad34df516d0a14d53c944ced84c116c961bf3a904eefc519a9de288827b4738a9ca2d2eee48fa13667001413cdf0ea3eae11f3f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d345268549db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51AF5211-B578-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 592 DesktopLayer.exe 592 DesktopLayer.exe 592 DesktopLayer.exe 592 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 1760 iexplore.exe 1760 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 2788 wrote to memory of 2820 2788 IEXPLORE.EXE 31 PID 2788 wrote to memory of 2820 2788 IEXPLORE.EXE 31 PID 2788 wrote to memory of 2820 2788 IEXPLORE.EXE 31 PID 2788 wrote to memory of 2820 2788 IEXPLORE.EXE 31 PID 2820 wrote to memory of 592 2820 svchost.exe 32 PID 2820 wrote to memory of 592 2820 svchost.exe 32 PID 2820 wrote to memory of 592 2820 svchost.exe 32 PID 2820 wrote to memory of 592 2820 svchost.exe 32 PID 592 wrote to memory of 2888 592 DesktopLayer.exe 33 PID 592 wrote to memory of 2888 592 DesktopLayer.exe 33 PID 592 wrote to memory of 2888 592 DesktopLayer.exe 33 PID 592 wrote to memory of 2888 592 DesktopLayer.exe 33 PID 1760 wrote to memory of 2868 1760 iexplore.exe 34 PID 1760 wrote to memory of 2868 1760 iexplore.exe 34 PID 1760 wrote to memory of 2868 1760 iexplore.exe 34 PID 1760 wrote to memory of 2868 1760 iexplore.exe 34
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d7bad80e5e97ff233c7acfc880f7ca41_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2888
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:5911555 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2eefbcc98c4b8872278af2b5da503b
SHA135f3255f4b4e9e8d67a4c252063be341553cca4d
SHA25620c9fdebc045bf61e53587f4d3ed816923be41071c4d8a4da2b0977f8b8921da
SHA512da63a3099a698a14abe522039c8e9a7590b551cb4520f628f490f2028c25efd47d231237c7935f29754f7d8727f7cf252b40581bd6fe83f73f5468f74c043e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d43dd3f82669a5ee4629d9d5ed2bfa63
SHA1017ab0f016a561c84c8b7b80922d7450815d700f
SHA256d332d766663e4d6d0c28054862f44da4cb4cdb8b98e300f750a3f2740ddd3045
SHA5127f4cc91a146833f9aa293192b6b7019bd2ad5a05faab3733cd8f756a4299ea0eef74621ec09294a900ca28af9e422286727c706609b28e44857442593e9eccd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24f3a22354a62abf46a5337fc7f2715
SHA12c3ff15de7c61f9fa4de3e164bcffddd7b68d866
SHA25671eb50c4918195229171b4958abf082e8377d474276e77abd813ef6b8d07a4da
SHA512abb8115b16e2a970f6c3879d9b5eabb58cd4431cf7933adb93e201b9ddd38c3c1ad3bde4823c9a5b4d4221bb20e939c6e66b44d71bddb68e3a9258fe6bdc601f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cafb44f377e7ddcd31084ee82bf7568
SHA18a6a63b5ea2a8676448cabf5e9927f742c990ee7
SHA25666b48fcc7c2c8656d208134dc612faa60b53015d14255044c9c230986c231c26
SHA51288caabeed7da8d521a3c88a698e7b6bdfefb14582c7d759dd6dd18e2106ae47a4b2a13868d7411ea710b24400f9bec6c141aca2e284210723ea84a71ff5aa920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b934586efc7fd93498748fcdb42756c
SHA12469215e566446ffcb0eeda35525a13d23ebdbef
SHA2563802f7f0f3c380900e11730a0318ce39eba76f76569d7976e32ca7ea2299e5d9
SHA512b3a42c6d6ce6a1820abefe0886a4608c7f3a973325e724387442a9db165f28dc69ac45ba5e6a0a2c3e8bd0483b3e1a56c118e17a2e8fe4a9342f37d235552152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e6c3d522520951ee09ee959eefcb2dd
SHA19e1a4ccd3981b5651c440078f26f561cedac626d
SHA256e3e9d56a0a65ab91c98986ff5c9ad76ca15b7809e3c643822416d3cd9c8c2421
SHA512d94bac17006581e95f44a62fd39bb5d35e5dfe15ac67ce0d5185fa3b953091fbb43dc263a5c1d7c9253deeee5bb7bfb8e62c2e32bbdabca3deebe8a1496a692a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9af71b5328437322dde0c34fe593fca
SHA113ba8947fa0cb802c3cc02a8916d022136aac728
SHA256cd10cb127417ff72908409efb190fa494869fdfb83102cf86f89210ab8e9ed32
SHA5127f4c7cb63a055456a4e56da97a5dd65a7e0d433bcb1391b348cb0371128e5f5b1f6f10c79971b89855388845d030f6f24251cb1ffb44bf830d41e5b786630a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531021683fd78b51694f51874043e765f
SHA174f364ae665d44ffa1b6439e36dc59b986c1c21a
SHA256bc6d727c9ab180b5498ba21852494cbd870c427922178ba93bba3407ea968f0c
SHA51216963fb8e03623c04fdd5e9638919f9391eae7db84041c70625fa354b63fda988d99865068f6cc445e8ca98503d5282bc8962bf50d1cae23f26795610ae97519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5eddc963bdb9b1eae97fd756853db48
SHA136719dc06dfecbe9306f3642f7c60e8bf34035b9
SHA25611deb46c74d51c78715a97efb827ddd06fd1b704f35845105fb4b613faac50ad
SHA512a4fa483dae9fc8eefe6b8e55a5da0f2e703f31f18254fa5a08d1a9378a1756bc2a2f0e9c224f4f339922a179e55d47494cf9c1f4a7eef746c5d4a485dd68d9b6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b