Analysis
-
max time kernel
139s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 12:09
Static task
static1
Behavioral task
behavioral1
Sample
f3ef171efe28f5c6435924b931ddbede_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f3ef171efe28f5c6435924b931ddbede_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
f3ef171efe28f5c6435924b931ddbede_JaffaCakes118.html
-
Size
124KB
-
MD5
f3ef171efe28f5c6435924b931ddbede
-
SHA1
ffb821096e9d02628e35805b69cc98ce71315ed2
-
SHA256
4ac5229fc454f7f0de5c6b5affadae3f557e8cedae45952398ac4a594a3359f9
-
SHA512
97df14846adf55474be7ea214931921cf3944e9a8401138243e2c56b6c9ee2cb864a3a5db52cb0786f0d0e238f636393d5359a5f1a96e3949acbe5639d044949
-
SSDEEP
1536:EwRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:EwRyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2868 svchost.exe 2928 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 IEXPLORE.EXE 2868 svchost.exe -
resource yara_rule behavioral1/memory/2868-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x000500000001a469-6.dat upx behavioral1/memory/2928-16-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2928-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2928-19-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxF46D.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70cfa28eea4edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440426458" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000a71ec174fdb24a7579f8b040c11cc16d44d7fa4b52428ad038220c494ea62c66000000000e80000000020000200000000a09489df1ae86f1a8134e07dbeee2d6a04f5e45fa8c213b3e9d203ba5978435200000004bf3024df5e5be21cc8cca34dd28121b950905c000c59fd96dd613f1e93a560440000000415dfd64eb0d5981197c6ffecd48db06c279204ef8b1858772a438eeb56902f28c118df67d170d7dd13af6bf4e66b37aa34c280e541e56ce16cd2d93aab5c578 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{797D5B61-BADD-11EF-911E-C2ED954A0B9C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2928 DesktopLayer.exe 2928 DesktopLayer.exe 2928 DesktopLayer.exe 2928 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1492 iexplore.exe 1492 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1492 iexplore.exe 1492 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 1492 iexplore.exe 1492 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2932 1492 iexplore.exe 29 PID 1492 wrote to memory of 2932 1492 iexplore.exe 29 PID 1492 wrote to memory of 2932 1492 iexplore.exe 29 PID 1492 wrote to memory of 2932 1492 iexplore.exe 29 PID 2932 wrote to memory of 2868 2932 IEXPLORE.EXE 30 PID 2932 wrote to memory of 2868 2932 IEXPLORE.EXE 30 PID 2932 wrote to memory of 2868 2932 IEXPLORE.EXE 30 PID 2932 wrote to memory of 2868 2932 IEXPLORE.EXE 30 PID 2868 wrote to memory of 2928 2868 svchost.exe 31 PID 2868 wrote to memory of 2928 2868 svchost.exe 31 PID 2868 wrote to memory of 2928 2868 svchost.exe 31 PID 2868 wrote to memory of 2928 2868 svchost.exe 31 PID 2928 wrote to memory of 2916 2928 DesktopLayer.exe 32 PID 2928 wrote to memory of 2916 2928 DesktopLayer.exe 32 PID 2928 wrote to memory of 2916 2928 DesktopLayer.exe 32 PID 2928 wrote to memory of 2916 2928 DesktopLayer.exe 32 PID 1492 wrote to memory of 2780 1492 iexplore.exe 33 PID 1492 wrote to memory of 2780 1492 iexplore.exe 33 PID 1492 wrote to memory of 2780 1492 iexplore.exe 33 PID 1492 wrote to memory of 2780 1492 iexplore.exe 33
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f3ef171efe28f5c6435924b931ddbede_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2916
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:275462 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aa1a8f7e90d6b105e542f6189ef0a34
SHA1fa12dbe10368ceb7aa3943b167ad1f407982b053
SHA256b09673aaa563b153efa9d53c4b65771ee7c30adf4a2446cead315fcc8583b60a
SHA5126c7b5e4aa906eac952e26609ff39ce053e40d6a1b59e9e34816d39825a43611069cb75826409098877c8724a3f3f434387c48db73643ae86398274efbab19cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ade3e8b47c4a6ec2e6c1101dd959d1
SHA12e6358ca6c4ff67c402e1b7f479ccb99774d864e
SHA256dd804b0cb33abaa348cbe9f2763c19eee8e65177b815d073bf8226bd3442cb1c
SHA512a872d4479cef66675fe1637181598ae12ee965b96f0b9b2845a65a07dcb5261d4d250b9068af238a7286c196ce02853dd578cf5e918656133a00944c61c63c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e707833d6ba0428b6eef64e91e0062f
SHA1e56595f31fb75a04a5078237d13c55b4d56c71d7
SHA256ddec098afdcf684c41bab69ba37fe3ef06e9ccefc77884e5a1e92f7dedd8bebb
SHA5129e4921a0ad86a044107474eed5d778fc407fddb73421092f2410b54c38e821f8f966b541a45f64279e0dde78e3ea90f5ebd508b052311b2040f936d697a2258d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f138aa3fd1d848c8cd700ed28f5188fc
SHA18951c072b9ebe4a0d56e0dfac0a40ccfb65ec253
SHA256d5f32ac63bc6b9b807576ceb45b5427219ac7a584a9b97bb90a5f7c10fd8d3cf
SHA512fde1a55a9872e8ea5d46f445eb1381b93a1368188adb361d30f4e05ecba0f0ef2a2ddd19ad5fa24f61930b853032a5ce9b3a4bb676cec3d251b44f25065cf52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b39fae1e0cd886affb86c96df12a79d
SHA18e28194136bfedc08a8e148caad907a7e2a6a640
SHA2565e2f204209571a4ed1c541708bbf01988c8c49165921f6ac1a0521f64316841b
SHA5120910495ce102415b70ff662e7d3bdc6b4e7cbd376b54e1e0dac558b0a921593a48d5943ee32f443bffb0cc1688e61b2b3eed379e9a4b191798808f9c6ea3b480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c137326e5da7d4a587f4149c85d57bb2
SHA1570e1351861f52c85bf31c84f963136157659b51
SHA256d80983a64642c3a9d08c755c529aee5dfc5f80642a50e25dcc0cde9de0777c25
SHA5128020655b7db5d6c9180c4b8960fd3e47337ed1f114311eb76287c0810df02d4663cf104b2746b81a77fdf7187515149eaa9ded2a3cd30367160d769936a8574d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19f17931241f8aab7392c9fc84f51f0
SHA1a1d169c8cb3967db8d84ba8fb73be13a1dc2d8de
SHA256d4af9fda3ce0463a9dc46993e9c2298d67d1126bd372fbc71c2696fe58721473
SHA512a548be875738e350826cbb5ad1bebae38ca80a2dc4e616e54d7902a56a9ae4a7819038433d1e70c0a539cd9604f15f79dd466e4e035816718a9b44b732b26bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71f4d3e2e8cbc79f87b1a5224843fc4
SHA1dc140ffe1f0143bda1f4497f885ec8aba0eed039
SHA2569b38ce03c6ab66f49763b5578fc151a4ba917c6f34f93d385d22bb09141fd2b0
SHA512a94beab4be157752479348476d764bed959638b2555ad9f5e1335938fba273b777eaed22b7ef5b1a9107503cc234c1a2debad8a184cc9b64aec03a52de0cc71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebbe665265b539212a46dbb9b0dbabb4
SHA10f733d7e20c997cc5d63e14b48eb5f25f75a4835
SHA256d1d21e8f76b79514fde8e71a8cbb8488e0b3d29418715f52cb7b5c313c990bfb
SHA512d2ebf3a4fa621aca6eb9cae1577e8ccd429dd6021148f577e884722048ad64629469752c0bb70c56ae3cab10aada3a70c879d77e57ceb675b51f9ad5cd227cac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a