Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 07:37
Static task
static1
Behavioral task
behavioral1
Sample
ea9a48ed308f59c61aedafcec9c514b9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9a48ed308f59c61aedafcec9c514b9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ea9a48ed308f59c61aedafcec9c514b9_JaffaCakes118.html
-
Size
158KB
-
MD5
ea9a48ed308f59c61aedafcec9c514b9
-
SHA1
c8422c29b2cbc83b3256ee6f247a38d580e298fe
-
SHA256
2a8a921aa185313bf5e3fa9cfc1f92ae2fd17c14023b1063e37944e950033df1
-
SHA512
a160e868e900741a73803f02df84ed33533155acc793d5462645f62c22f4d88eb272d0890290d9816b329aedab33d945a87f505abb07b53513f4accea39b12e0
-
SSDEEP
3072:inSNN+aDtyfkMY+BES09JXAnyrZalI+YQ:iStD4sMYod+X3oI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2300 svchost.exe 2992 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 480 IEXPLORE.EXE 2300 svchost.exe -
resource yara_rule behavioral1/files/0x0038000000016dd0-430.dat upx behavioral1/memory/2300-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2300-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2992-449-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2992-447-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2992-445-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxCD2E.tmp svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440237334" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25F173A1-B925-11EF-8D9B-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2992 DesktopLayer.exe 2992 DesktopLayer.exe 2992 DesktopLayer.exe 2992 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1488 iexplore.exe 1488 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1488 iexplore.exe 1488 iexplore.exe 480 IEXPLORE.EXE 480 IEXPLORE.EXE 480 IEXPLORE.EXE 480 IEXPLORE.EXE 1488 iexplore.exe 1488 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1488 wrote to memory of 480 1488 iexplore.exe 31 PID 1488 wrote to memory of 480 1488 iexplore.exe 31 PID 1488 wrote to memory of 480 1488 iexplore.exe 31 PID 1488 wrote to memory of 480 1488 iexplore.exe 31 PID 480 wrote to memory of 2300 480 IEXPLORE.EXE 36 PID 480 wrote to memory of 2300 480 IEXPLORE.EXE 36 PID 480 wrote to memory of 2300 480 IEXPLORE.EXE 36 PID 480 wrote to memory of 2300 480 IEXPLORE.EXE 36 PID 2300 wrote to memory of 2992 2300 svchost.exe 37 PID 2300 wrote to memory of 2992 2300 svchost.exe 37 PID 2300 wrote to memory of 2992 2300 svchost.exe 37 PID 2300 wrote to memory of 2992 2300 svchost.exe 37 PID 2992 wrote to memory of 2376 2992 DesktopLayer.exe 38 PID 2992 wrote to memory of 2376 2992 DesktopLayer.exe 38 PID 2992 wrote to memory of 2376 2992 DesktopLayer.exe 38 PID 2992 wrote to memory of 2376 2992 DesktopLayer.exe 38 PID 1488 wrote to memory of 1988 1488 iexplore.exe 39 PID 1488 wrote to memory of 1988 1488 iexplore.exe 39 PID 1488 wrote to memory of 1988 1488 iexplore.exe 39 PID 1488 wrote to memory of 1988 1488 iexplore.exe 39
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9a48ed308f59c61aedafcec9c514b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2376
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:209942 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa7d9b3d54ff0146f9cb57cffd19bd4e
SHA16542ebbc8a73cb825d0d3fde7f40f97186e15c03
SHA25691539702648b89d9a807b0937645b65b4a5643eeebb678e62d54f0ea210288a0
SHA512c6731101347387ac18225f830325d87f3dcfae719664ed264f57326a363e503926342af83da8a0c8a32dfb70a8d1ea70eac138f49289ae90043489a28e092a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57f915e62a60e34838e724c4f49e5db
SHA145407fa8b4eeb0a34dd9964939e8869654eaf7df
SHA25637656adbe4b1d0b818be74484e7d9cf506961fbcd0981097604d6b82b8596e3a
SHA51277a773fe39a7df695d3e40c16602374cf9470a4c0d97b8a2b969bedd0476a9455805997d7a3767dc8d6975df78c906245eb5be85b7b1defb7ee7795475319e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2b612ac01fa4dea1a8793697506849
SHA17052e5b3a78ce958e25a652d852b9d3a29552131
SHA2568b2f47a8473c9c173040542693a9f39218ce45aa22f60fa756f6d709ee7b29e5
SHA51251a915711a7a4da2d2276830f4cd1df0c7a60dfe2c1c17d1eb0f8bdabac505fe2615a2a80f607d2b026086cf76196eff89a8e0bdcb785aa7975467e999e9b3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5119bec72db4bad9b113006e42b7799fb
SHA1f221d15bf119070296a1b2c11b78808c6fafeaa0
SHA256a3d9482816f252d6405d2dd5e06410ac64997fbbf976d24130fd7bffa4bb702e
SHA51223be03573de226a09904d33d76293cd45bd53404571fcd912044e4b553bba694d6f01c0b9601000e6ee11528926166606be8193b161fc4b05fca40571bcd250f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2234db45a085c918fbc8995aecdacba
SHA12f7acc15db7a0ea4b47950c7af1fe1aa9361f377
SHA256f571e4d764cd7a93f576e1ea4b7e81d593654105c34fdd996a42e1b0c3822a8b
SHA512b20a8c732aae7ae58d24ed5b707275ebba4abf0fbd9106b566284b40772be80c905a00640516ff1af044f08487756e16fe142dff235ae931a26a3e596912de39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5941ff8109c166cb945278f5686fb4de1
SHA1c99188ab82c92da5ef57379bba7f75064d62c8f3
SHA256e9f3b8e5c132b963688566ea18df216cda7a64f6d5aa4ff52204025b00528981
SHA512b5caac1a2da0c63bc5f36d66a62c31223f6845b75994e09373316153a4a262cc0e095c5ad50eeb31244f9cb34943ae35525ffb969a1a41ce71737dbd158feb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52445b98da0cd854cf3490f4825fd5d0f
SHA1da4b4358b6dfb57ade283b26708ad2234cfc7b21
SHA256c134179a123a8fd7fc8ef566681c089ba7c04431f1a73f7b31afb54ec81620e8
SHA512118832acecc9d68314ed48fa88ef0fbcf67a8812b56a0841aa2843f148eea75e88f2d65b8646da12026d1354fb86762ce02c9428cc212503035dc5634012cf8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dedc4f10653e920cb59d3339f93fd89b
SHA15a21cd9b7d076f2a527f14d012eb6e01865c3b69
SHA2565fcb377a556fbd1bc128d9f2076761fb2b073843b41c10172953021fd48a6b10
SHA512574fdb6d380a21bbb1c5cc50160b42004c0085c782bc5936f38d5a37cc9992b6460b81fbd38a7124d8764e34950730d4d9ab8186612dd531a1231c07a2da84b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50990b43881839301ab08069dbe04f229
SHA1893843f84032f2f034b46fd353c01c818af274ee
SHA256bcb9ad47af977d4eb07d5563924911c4422633073b1f30285c8a8cc1e17a5148
SHA5123eef719df1682993c44d995d5e40850479355e1158742ea6c7c9e3e8537757e3a7f1fa0b5287e33f0c334c6cf911161e387274db289bbbd45e103ac30004b8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7a91f94afc06e76416e6c737db291d
SHA16a09695e1345dddef8feec588835dcf0e3d38b1e
SHA256714a00e2989a1e39437f5e2f39589b4162c77f8fa334049f1b6a5c2feffe759a
SHA512580d585901c91956a313e303aa2aab2668eb9faa693f0afb1a5270a36132bcb945295466a50d7ffa1b3005d3b851c4e7be4ff6616a39834870cedafa7dffcddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd9ffc2746f1047531f7e7ee4b51d6d
SHA13af8e1d0d28282ea2e136ca31774a2000869e537
SHA256932cf45a2bd8a20a8e7aaa559bc739a529b1a8f22cf44738e03ae64f041ec9e1
SHA512989ed2b09f8f01b2cf23bfe0454d299979aa00bbdbb323221ac524acfffe6d4a9500405761f53e413f90d5e1bbe69abf3f4516dbc8716c5141ec334a64a5d834
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a