Analysis
-
max time kernel
132s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
e132330f35ec5d2a8928447fc5ab59b5_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e132330f35ec5d2a8928447fc5ab59b5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e132330f35ec5d2a8928447fc5ab59b5_JaffaCakes118.html
-
Size
155KB
-
MD5
e132330f35ec5d2a8928447fc5ab59b5
-
SHA1
ade925bba975abddfac3dab9535914b75d54c27d
-
SHA256
4da7d2d5f9f33af4e1f5a45cd20bfc39538d548f1fd77a635c2fd37b7387e250
-
SHA512
e27649fa12fe2345fb332eca26ccbf74bff30a72d3d0c0514e63e7e3c70f65231ed30ea935d8aba294cfcf97a4f16a963c41cde592a45dbb891b41766b360425
-
SSDEEP
1536:iMRTvosjLeuTIrl0M4zm0yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:iO9zE0yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 3064 svchost.exe 1788 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2496 IEXPLORE.EXE 3064 svchost.exe -
resource yara_rule behavioral1/files/0x0036000000016d43-430.dat upx behavioral1/memory/3064-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3064-444-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1788-445-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3064-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1788-449-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px8F06.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440077396" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2E06661-B7B0-11EF-8B45-D6274BF0F910} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1788 DesktopLayer.exe 1788 DesktopLayer.exe 1788 DesktopLayer.exe 1788 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2656 iexplore.exe 2656 iexplore.exe 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2496 2656 iexplore.exe 30 PID 2656 wrote to memory of 2496 2656 iexplore.exe 30 PID 2656 wrote to memory of 2496 2656 iexplore.exe 30 PID 2656 wrote to memory of 2496 2656 iexplore.exe 30 PID 2496 wrote to memory of 3064 2496 IEXPLORE.EXE 35 PID 2496 wrote to memory of 3064 2496 IEXPLORE.EXE 35 PID 2496 wrote to memory of 3064 2496 IEXPLORE.EXE 35 PID 2496 wrote to memory of 3064 2496 IEXPLORE.EXE 35 PID 3064 wrote to memory of 1788 3064 svchost.exe 36 PID 3064 wrote to memory of 1788 3064 svchost.exe 36 PID 3064 wrote to memory of 1788 3064 svchost.exe 36 PID 3064 wrote to memory of 1788 3064 svchost.exe 36 PID 1788 wrote to memory of 892 1788 DesktopLayer.exe 37 PID 1788 wrote to memory of 892 1788 DesktopLayer.exe 37 PID 1788 wrote to memory of 892 1788 DesktopLayer.exe 37 PID 1788 wrote to memory of 892 1788 DesktopLayer.exe 37 PID 2656 wrote to memory of 1524 2656 iexplore.exe 38 PID 2656 wrote to memory of 1524 2656 iexplore.exe 38 PID 2656 wrote to memory of 1524 2656 iexplore.exe 38 PID 2656 wrote to memory of 1524 2656 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e132330f35ec5d2a8928447fc5ab59b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:892
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:472074 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319f15e2d1098b9c5dbce0d4c2027f7f
SHA16a851048c0a46cf83e17aa5d70a0ca119f8b9209
SHA256a939392773c009fa9dd82880ea50c135ded8dd67ef8a28dc16ba5a03ca1f661a
SHA5120b502d4bb88c9f64b529c04ddd93acdd9d98e8536b9c2204d70c3dff93105bf8dd38d01638e1217160f69773371c1a47c44458840cee917dfbfa2a0bd45ade4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5adf926a5b37c99123751d3ae5d5227
SHA1e68349eba4a592ce51cb520e450e40113072c9b4
SHA256469913ab23c4a038fe1651eb83c86a0d5ff18e72e8af63c9c76c60599fdc5361
SHA5129ab92814f0f4cfff1f04dc8fdb9f2bac643fa3a655c4dad5cf0c14acaeedd1e261ff9475d5ec98b415c7c39130c5ec8b21c9e2b98f065c4e3e94e57f0817c492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d45ce604996ce840639e2b6676d91e9e
SHA1dcd22dca096ddebc5a8b8685dfe3eb5900489735
SHA256b375f05b4d3072ffaf124d7d04f1d2dc404961a933b25583ba6f15478a1b9710
SHA512c270d3f652e7684da0ea18e3f21a82f1da0477a107ba0339b9e47817ee6969f77b6796341a48bbc260abf9d1dd4270441dd8fe83e91925fe56bb23a7655d7697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e55bf0e00a5c9bf0d526240daf7f952d
SHA1fe2f00a7255970499af1cc70003a119f4a3563b6
SHA256be2528b2a6371f0a181f67b267d26ae25786b2f4db2264270a1cb7fd6a2fed55
SHA51216a808fa9ae61ca4defc257d20f5b6da0b628750f25a13dbb5dc72c1b3c50c51861f02dbd6fe203105badae3f9870057de16f7ecdcbe2a62c839683e122aa905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50942bd5c4dba98a21f592bebbf3b6d22
SHA15fada7b36a8868107d73b93c75ca6dc0154d8a47
SHA256560d3b1b2dc8c903b538a57641726d696e37fcf15ada5e97aa04d00df7e92982
SHA5123ee224dc3d593b54e7e0f1c8e3cc9f2d2b76676190f8f93927371f8545e2cc9a2060a29594568ce4d7dbf804d909785b3b82a9dbebef7ed528439b9f5904836c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a97ebc11028d636862d3014529a121
SHA1f2f6b1203e9604d852c273a0b4662b6dd5a47d73
SHA2565f9ab7ca39d5a9a6efd4f2e1e0129730496a90787a61a432cd09e86ddde765df
SHA51222644ec1784607a265fbdcf74131221819ae662b15f07b46e16b2623ca4be85d1d30dfafbf96063142a15784bf9a9185013269fc3b38f736ed432f8a8392d1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540bcc0e2091a94c0c0efd2286856558d
SHA1cc935ce9076e116e3c64bd893f7aa2f2d05c4e47
SHA256922802618e653df7839cbf32a6e4114e52cfb27935a1c5a420b594e8df54ffc5
SHA51202bfea1947133103088ae604ad50014aea99fa4e452af383322f1d8ffe96f24faea665b42b82b3e00d11f0a005b4d0ec2c35e99491c4640e798d37152f220335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c79929e37d2da486bb959d26cd9abf
SHA10c1e55e2556003e651f88ce806cb72f5241ec8af
SHA256beaa17e9776ee83a316617985c2a7e75214ac096105eaac3ca61e223677f442f
SHA512ed1cc69dfcb4d095f4cf527703f4bad478ba189e5702669a09d82ec35abc9d67fe946b8cb3fdc1b8d4c13ec8c0d3870cfee79c42ef67dbee29cf5f56243061f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f527133b14595bd11454f292cbd1ed24
SHA1115da7315ecc02a044fc64209575ee21291cd3f3
SHA256f1e0b7e7d9a8434de101ec794d7c93f9665b0f3d59d897b5ccb8f7006c90d13e
SHA512fc9aaecb101811e743cc9ec01f748243b09131ebf2e07005a2df4d546a1b470aea5215405b371c6fb1c53b0e04465d5dcefdc30cd9247f2738f7bfb038bef5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b1941ee6984666faf77451164118243
SHA1fa5396a234c5d9d4bd54d0f7a505342f0d37a36d
SHA2560d897480a0c01f79eff800459f9504fc60c0ed27e1d6a7386eb1ea769fa0b33c
SHA5121c4b943c88efefe215a0f14ac6c2addb21a9c2ce89d35630a3d495e1704aaa0a65d63584e2f18a94719cd3f37e3795bbbbf3be18656e2fdf0bc9aaa42eeb0660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6552bc5fdcfde384517ae63e2e08a6
SHA1e511a91df3a34a71c7b317623deecff283951cab
SHA256656c79f0f820ea035adafdc0840449c93cb322af0569ac801efca8ed4f14a583
SHA512d75e143845ad13d2e36f4ec773e61a0cb8fe04cb00ad99d3726791f0fb8e8e33157f0fe6784384bbbc91ab9b60a42080417137d497536b3777668ad10e13e2bc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a