Analysis
-
max time kernel
131s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
e99d7edd75d5d247e09d8118929f5e28_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e99d7edd75d5d247e09d8118929f5e28_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e99d7edd75d5d247e09d8118929f5e28_JaffaCakes118.html
-
Size
160KB
-
MD5
e99d7edd75d5d247e09d8118929f5e28
-
SHA1
890724c3120ab675ec49d2b293e2d0c3f3497ed6
-
SHA256
2c1d624f9ae21d1f1100b2cace97c842c42d1cbb2982d53ddd2ade3d0c29d6e9
-
SHA512
77dcb3211d034f1e56a620dd8d3b94e812bca97888a3cef90d2d4a44db8065efbe92ae320bc7aa09a83b797fb2ae58b8f25fbb1ffd11be5689d078957cfb46a4
-
SSDEEP
3072:iqttK8/8eyfkMY+BES09JXAnyrZalI+YQ:iQtK8/87sMYod+X3oI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2904 svchost.exe 2136 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2632 IEXPLORE.EXE 2904 svchost.exe -
resource yara_rule behavioral1/files/0x0027000000016d2a-283.dat upx behavioral1/memory/2904-287-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2904-290-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2904-289-0x0000000000230000-0x000000000023F000-memory.dmp upx behavioral1/memory/2136-300-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px4B43.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440221405" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02671F91-B900-11EF-87C4-5212BBF997B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2136 DesktopLayer.exe 2136 DesktopLayer.exe 2136 DesktopLayer.exe 2136 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2940 iexplore.exe 2940 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2632 2940 iexplore.exe 30 PID 2940 wrote to memory of 2632 2940 iexplore.exe 30 PID 2940 wrote to memory of 2632 2940 iexplore.exe 30 PID 2940 wrote to memory of 2632 2940 iexplore.exe 30 PID 2632 wrote to memory of 2904 2632 IEXPLORE.EXE 35 PID 2632 wrote to memory of 2904 2632 IEXPLORE.EXE 35 PID 2632 wrote to memory of 2904 2632 IEXPLORE.EXE 35 PID 2632 wrote to memory of 2904 2632 IEXPLORE.EXE 35 PID 2904 wrote to memory of 2136 2904 svchost.exe 36 PID 2904 wrote to memory of 2136 2904 svchost.exe 36 PID 2904 wrote to memory of 2136 2904 svchost.exe 36 PID 2904 wrote to memory of 2136 2904 svchost.exe 36 PID 2136 wrote to memory of 1996 2136 DesktopLayer.exe 37 PID 2136 wrote to memory of 1996 2136 DesktopLayer.exe 37 PID 2136 wrote to memory of 1996 2136 DesktopLayer.exe 37 PID 2136 wrote to memory of 1996 2136 DesktopLayer.exe 37 PID 2940 wrote to memory of 1944 2940 iexplore.exe 38 PID 2940 wrote to memory of 1944 2940 iexplore.exe 38 PID 2940 wrote to memory of 1944 2940 iexplore.exe 38 PID 2940 wrote to memory of 1944 2940 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e99d7edd75d5d247e09d8118929f5e28_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1996
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275469 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f75724693e434edbc4c46a14b26e7020
SHA1ba07bf3a086ae227667e9fbe8f921ba103403414
SHA25690b7bc50d494a197ecca862151f274dbd095a2a3fd59dd7ffdd3ab4cc3565693
SHA512eb754bf848d22fedfd337a7198c6bcda5ca9e274ae322561434d71dbe7e332ce75f0f1c681e526e3c2ed5b93dc086bded78c617dfeb5a7d50e082ad595f79bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d7b94c1b491c6cb1b14bb176fefd4e
SHA132c1c1538ccc8068515796b9383e78c68f3276cd
SHA256000cb3d4b7e3ca1153a267368c6b8054ec5aad44e55b9d7a458d53d508f9ebea
SHA512c023dc8b34c50741c6db9b2f599fdbe61273c9c359a978a9910de2397b9037704aed727a19cb510516464e38864e5627bfb027404ea138202c21e28ee2dbbe5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52790db34e326c2b33f1b0446235dff9e
SHA11d21a376f8d90ffe0008140912a37217ff9071b7
SHA256cb5ebee9471ff187dc1cd0303d61726fa72f5d8e3cbe3dd48f6bd8963200d9a7
SHA512e83950f6dea22937d7f9b0376e744e49f2a74f527f924cb307eec661747fac6b86bfd4f1cf790907e6dc574c4964ae6bb841f20e26fe746352e9028dd728de3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba826c6550e8d8a6567847e5f3b7320
SHA19e4fdd8539acabcfe9be07ec34f26d0957ff902e
SHA2565438dd46b61ba10e9dabf8b8448c1adc1f136ec646100e26ef79bf0848420468
SHA51242b76d2a70d66d2b0889acecf529e490f8e27e5f1d4d4afa68bd579ad0c7ff672d0dd033f06794df5215a94666b8d04caefcab3b560f392486429d5286551305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21c866b2d621d8cf91165fc006f236b
SHA1674ce2701c572b5b7c857a275ddfbfad591defb0
SHA256e5f8252bbef43bc5182828c0284e42fa7f0fc59ac361943a70c546e2eedb786a
SHA512a642f4ee334cc9064251d770988dff6536bd54d6aefa09cec2aa407ea0bc6441b5664fa53f83121b4031daf3b664534829eb1fc27485672a47b0666c0ad9c3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc377935bf63edc07ea0b5d77f82b381
SHA13bcd9b35525c2430e32607818df128598abfd768
SHA2560426a5f0ef47fc00aff689640b6e3d12a01e5b7637c6f1fcff865436ab19e76f
SHA512da69a2ff299949b1a670aeb6d554cb25d5c292dd01af3cf790d58765f1562c8392f879c43a8f2e2a4ddb1498e4884da2d390fbe9d6a245d9c08b0fbb2356f167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa45b4da7a43bce0cdb1a6a2d9724d40
SHA193d2cfcb9b5fe47b64f76006b77cdd436dcfb659
SHA256d3e8709670e8073299508c281e0b0df4200cc66126fb03a508ec2a55e6af2396
SHA51235985dc02688ca2cfa763d5b4d5a6675d71d01ddd1daf50a6d6c0c0e683100ee886b81aa2b3ff352defa4cc615f8ac5e86069ceccabdb363f3731a7318f8028b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167240a29f48d88997f017c7ceb02f89
SHA1ba5da7a7ce5d20ae159b847b454898dbdab65f8f
SHA256fbef3b4bed01e8de4ab8ecd34b77a16b898e8e1e2a67eaf3eaa39ecd8f871385
SHA5121a7cd85ca0043900e782a3cfbd532c476fd8bd89f9866390094fc1e4f4dbe417878c66add8ea5058f1e1da6b9203d614168cd1cb7025598c6f06b769b38b74d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5486345cf7038d9f4c5b2fcb1094cf5bc
SHA163446e04453765ea94fe4e6a25fd4d7eaceba546
SHA25615439145cb0ddc5801ef882282712f43688050120da7cc34c0260ca4f1ff614e
SHA5124615f8d6170e11fd11a0cee56b7812e2f6565d5e833489910b47e2ad60d834fb74341c11bcd37c0d9a96d883ad233a4d69fefe8b448240b6b641cb18e5918a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1285b03e02b706e89d7fb15affda7a0
SHA1663ae8e458d9a9245af9323117385c46e33028c4
SHA2561c257077ac6b49f373b7ef7791d7495e8cb8a17d6a7510512f3d9693099d1581
SHA51228f3e2eecb77e2ba814931d31780139b57242b24aaac18874f6fdb86c936707edb229026d9eee9ffe3e31b977c82f46edf46d24d3dc1198c2f600b6e3755b6a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a