Analysis
-
max time kernel
139s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 11:24
Static task
static1
Behavioral task
behavioral1
Sample
eb468d9e98f5a824ce3adf8615291bf9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb468d9e98f5a824ce3adf8615291bf9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
eb468d9e98f5a824ce3adf8615291bf9_JaffaCakes118.html
-
Size
126KB
-
MD5
eb468d9e98f5a824ce3adf8615291bf9
-
SHA1
caca9dda68f1cd240704aadbc5f547ad968dc044
-
SHA256
1d3385060239cd750e92437bcaa7f893b8cb5433a644f7256200848bb9ac5ce3
-
SHA512
410b97a9fc64289eefc0be904b1568af3e61db2129f2b2d264f152226b3996caea67d51bbdf86082e095e61f7309bf108443f36af90de6724711e4b8ced22589
-
SSDEEP
1536:iX9kyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:itkyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2752 svchost.exe 3012 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1736 IEXPLORE.EXE 2752 svchost.exe -
resource yara_rule behavioral1/files/0x0007000000016d5e-5.dat upx behavioral1/memory/2752-6-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2752-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3012-17-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2752-16-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3012-23-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3012-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3012-18-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px927F.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D584EDA1-B944-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009785110b3628a7418b80539060e4baa0000000000200000000001066000000010000200000000858f23b1c626ee9114eb76979bae01f26b756419303f8d8da43bd40f62b7034000000000e8000000002000020000000eb5329385504d920bc44ef9eaae441976e17c1e1d4aecc9221488c52f7c8d589200000002ec4edb926f55a5df58f88e1f9bbb482a797c488c04ce4139cc618936c56b43240000000fdbf4fc1ea38127a5d7011577edea00e4894448c387cbc24eb39fb520feb3b5089fe8cab3a819856a0c7dfa94ad16e52828ef0900141fce48d89d7c1da8bd410 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440250943" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009785110b3628a7418b80539060e4baa000000000020000000000106600000001000020000000cf255c7db65238760c9044f9a3d24aab4c034c09271e165eb2772f6757c644e9000000000e80000000020000200000004e6b14068597b1b53448750d09a5d2fc3d671915ec6d89609a9997dffcfa66019000000088f2140c00161c182a423104cb5e55bac2d557b180ea1922bb664a6b86e4097d20b71d97ca1b253e52ff5b5572d63df3c8b0dd38a4ea4f5f9a8975465f74d90b3cdd1d1ae41305a8acdb1cbbc5493abf670cb47ae9b4923e1fd30bb4ae36a58ab3de7cbb94a24328e50779346d7cae7755eb7aa946d5232f774df1c5074ae5b4c1c057db91f022a5d45305ef470288dd40000000f6448ebaaee2c46f79badd82a7b091da70681232186f57d5fb7262790846e2a5069eb25707ad7b03c792fe602a74d21aeb1c09918022f85855f62cb26b61e7c9 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60db8aea514ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3012 DesktopLayer.exe 3012 DesktopLayer.exe 3012 DesktopLayer.exe 3012 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 2520 iexplore.exe 2520 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1736 2520 iexplore.exe 30 PID 2520 wrote to memory of 1736 2520 iexplore.exe 30 PID 2520 wrote to memory of 1736 2520 iexplore.exe 30 PID 2520 wrote to memory of 1736 2520 iexplore.exe 30 PID 1736 wrote to memory of 2752 1736 IEXPLORE.EXE 32 PID 1736 wrote to memory of 2752 1736 IEXPLORE.EXE 32 PID 1736 wrote to memory of 2752 1736 IEXPLORE.EXE 32 PID 1736 wrote to memory of 2752 1736 IEXPLORE.EXE 32 PID 2752 wrote to memory of 3012 2752 svchost.exe 33 PID 2752 wrote to memory of 3012 2752 svchost.exe 33 PID 2752 wrote to memory of 3012 2752 svchost.exe 33 PID 2752 wrote to memory of 3012 2752 svchost.exe 33 PID 3012 wrote to memory of 2764 3012 DesktopLayer.exe 34 PID 3012 wrote to memory of 2764 3012 DesktopLayer.exe 34 PID 3012 wrote to memory of 2764 3012 DesktopLayer.exe 34 PID 3012 wrote to memory of 2764 3012 DesktopLayer.exe 34 PID 2520 wrote to memory of 2600 2520 iexplore.exe 35 PID 2520 wrote to memory of 2600 2520 iexplore.exe 35 PID 2520 wrote to memory of 2600 2520 iexplore.exe 35 PID 2520 wrote to memory of 2600 2520 iexplore.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb468d9e98f5a824ce3adf8615291bf9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2764
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:209933 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ffce54ae245732c7db0f0ae38e318c4
SHA140fc2fdab2331773a96ec2f48e8c7bab5d3b24b5
SHA2566e37f0084448c3728f22302c7883049f84445b53bc1917ab1ecd35bd3477b2bc
SHA512a6f6d3aa8e1280926de0dec4ae9361c4bb1e90a7f4f4690fb00ad7c1db15311eb06722f277e789a762136a8b398fcd79e55e3c0ac5b5509e76c7bdca18c6d8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5439649b0814187411c5ac3d32b11b14e
SHA1295898ad64424a78681b53b7922fdc1fef80b1d3
SHA256a9714ff54e91a0f664d8bc7e9f9e5751806e3740120bc2c17fb5edbd2454ee54
SHA512b79e0cb8e91f9e0787ca24541d549aa4a699f42a20afb59f2ba09575560dc1c5f2c0cfdb9161913dd342e387c4e5a8e4289caabd6036b58988e96e50f4cf1413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5069fa7c40949f5fa14f74416325dd5ae
SHA134ccaed07ee4b5c596cdda9478d804fca385de43
SHA25683fe44101309d265ca54f330d91ee9fdf0f545ae2b0c8ae08ef2aafcb423c3e4
SHA5123e665fdf0189a2eb064e24a8ce3123f85721e6c127d825c940113fef6781fa384906f6413240d5e6f261ad17bafaa7673d24de808750c1ee7816bf9273cd0a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3dd46e7187bc09874fde11699adaedc
SHA1067bd44d34bae539681ea94d6ed3b98a5d4efa26
SHA256a38d242e1c308d342db62aaededeb69d6ccae7888a4fa46ce31953182e7df96e
SHA512d98a64096c2215f4c28c14355a57ff9930f18f88a528fc0316cd6be76112ca4b9521d491c6de7045b96cf49c9d55c885f74f4a4fffc925933415f5ff3eceff09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25cdf223fe77da90005d3fe14c832e0
SHA12a3cff06720c8bf991bb2fc2bab606df9e9ed1be
SHA256a66b3e6799420412c43cd95d19feb0fe493d18a64c647cb710bf9d5673bd028e
SHA5124329b2f9db658934072b397327c2551bf30c69f0d684cd5a3f5754e9189d77e8867ee31ba327a5fa95eae64de54f93994636b8ed14bd3733b330b5b49f538870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519654f16512262bb44f03fda3930499e
SHA189171ab4d755cbbffe05200fd1d1c6a4d68e51b9
SHA2562a2ac8dc548bd98847249880ea40217a0e9efdc7288fc77a555a19531d9affca
SHA512c5249d59f052bbbe8a1891757ce9a7b09bbfeb6dfc5add936417c5c27b72f50a72c75f608535bb26617f65d260b0000bb1e91499600759dff89117a97ac71883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51476d38a95b205589acf4b912bc6500c
SHA19040595c58cdf9a45639f155b3d7d5bc14a5d4c1
SHA2568965d0774a32d8abe4e8e412e7f22dbd8e29032e73cbf743e6d4d2cd50f5e757
SHA512b4aebc34654f4c02a785db68bae7d40d08ee66367741e187d338782519259965589b9c4f550c3934d7ff7a1fcf7dc82ffe61e46fa719346589d563693467e309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d197bfd572904b6747884b00904c9e0
SHA15c991e01dbb30616f888cbe5cfb8daf1e3062ea0
SHA256170a09bed5b46a698b266bafc6f68b691aa28ef8599ded043a0890fada645e4e
SHA5124ac1891821e4deb8a8639864c38fa4ea14a2c83bafbc1dd2fab8b3a3d60d67eaabf4d33a6b8adbeacdedbcd68bdf1de14dac756639ce61483eca60ffe366e07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a860ec84fcd7812b0348c2434131cd6d
SHA1c7c506463448d5f7b76d6ce93d35068bbe363e4d
SHA2562a117ffc7e077c09c3d177c532c0f0c67ef32e70fa44b46ad63c96c2897bb4b6
SHA51223ba6455e145f6e5ccd19bac6d6de1a3362792048e09bb07a736121e212560f2a3d57ea97a2875d4be7c72e361edc9c97d1fc539115d1b99a404946fbbd9b618
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a