Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
f73489ed29500a63f1932153ec2c43c9_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f73489ed29500a63f1932153ec2c43c9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
f73489ed29500a63f1932153ec2c43c9_JaffaCakes118.html
-
Size
157KB
-
MD5
f73489ed29500a63f1932153ec2c43c9
-
SHA1
7a6dc03aa723dca443c6463d53775d7fc62d835c
-
SHA256
7b40aa8f215fc1050d1fd110bbccedbd23d59e6963916f56a5874196cf8b0c11
-
SHA512
3ead46c7c0514e1c6ddd9459443834f0bd9d863839853cad2e060450a53627b546903252f2b06305ff39115eb74b9315fd241b97b26e61207b7b85602789641f
-
SSDEEP
3072:iPanVaycdzeqyfkMY+BES09JXAnyrZalI+YQ:iM8BzePsMYod+X3oI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 568 svchost.exe 288 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1420 IEXPLORE.EXE 568 svchost.exe -
resource yara_rule behavioral1/files/0x001700000001749c-433.dat upx behavioral1/memory/568-436-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/288-443-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/288-447-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/568-441-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxA380.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFDBBF51-BB62-11EF-AF8F-6EC443A7582C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440483668" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 288 DesktopLayer.exe 288 DesktopLayer.exe 288 DesktopLayer.exe 288 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE 1956 iexplore.exe 1956 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1420 1956 iexplore.exe 30 PID 1956 wrote to memory of 1420 1956 iexplore.exe 30 PID 1956 wrote to memory of 1420 1956 iexplore.exe 30 PID 1956 wrote to memory of 1420 1956 iexplore.exe 30 PID 1420 wrote to memory of 568 1420 IEXPLORE.EXE 35 PID 1420 wrote to memory of 568 1420 IEXPLORE.EXE 35 PID 1420 wrote to memory of 568 1420 IEXPLORE.EXE 35 PID 1420 wrote to memory of 568 1420 IEXPLORE.EXE 35 PID 568 wrote to memory of 288 568 svchost.exe 36 PID 568 wrote to memory of 288 568 svchost.exe 36 PID 568 wrote to memory of 288 568 svchost.exe 36 PID 568 wrote to memory of 288 568 svchost.exe 36 PID 288 wrote to memory of 2320 288 DesktopLayer.exe 37 PID 288 wrote to memory of 2320 288 DesktopLayer.exe 37 PID 288 wrote to memory of 2320 288 DesktopLayer.exe 37 PID 288 wrote to memory of 2320 288 DesktopLayer.exe 37 PID 1956 wrote to memory of 2440 1956 iexplore.exe 38 PID 1956 wrote to memory of 2440 1956 iexplore.exe 38 PID 1956 wrote to memory of 2440 1956 iexplore.exe 38 PID 1956 wrote to memory of 2440 1956 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f73489ed29500a63f1932153ec2c43c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2320
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275468 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55053c5439c753b9d0c2a1c0719085aee
SHA163313c57a0b2ed814fba6b2a195cb65e7fff7194
SHA256de253e733a70d917dd2ed2e0d88cefa9b645b2d77e5a84cf31d505cde02cf5d3
SHA512be6059b7901e42a7d8b31eadbd2f478de1f99165bc06329839095fc137698ff73c0fa9e2782ee8b77c773fb82a352075a5a25ae5a80fb0aeeb346b70d06bb197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485a5eb6b971b7967c5af692a4e0dfa3
SHA17296d583e2279c598c2f729b314c9914c44a780d
SHA2560211dc4aaed7f994ea550742873dffaa6c39d0744a984d88de117596558e77c0
SHA512f8337b7354121b1eeaeeed9feecd861bf83ed49b8afb42d97373f59719e878c026b19ca241aed3298316694dc500ca6f37d61d4bdd6493ed1bedf5902dde7928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d897a940d77e8f605ab8d73cc0b848
SHA172882810148407c48dabdde9399651a901e92e42
SHA2560435600e7effed286a22eee269f72afdf31d909d35693ec58626706cb3d2f91b
SHA51270f09b64be1c47073ee7b30bfac6d1394eefecb8b74b569c1bd3b5394986e64d9630d2ffdd4ecd2cfd0c94e6b08b6dfe6ae325fa51f9eef54157a02e34f44360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9880524cf3a8764113850e74a618ec6
SHA1069dabf8bb2f76b2c54f2f1792fc01d263150a1c
SHA256af54462f70f51dbde2ddd6157c20b60751d8280cc5b7f9c7db0f34d6bd749e29
SHA512493da04f025f8fb755cbda9d2cc0342ae292307cd8644a1f9bc6b784023b7435c0a4745b941e293894bc46ab457eafb6533a598ac012aa3926d170d10f22a0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3136831ade20d57952a65111f6a9f13
SHA1dde0783fa7f906d18bf1c7544a18a5b86242b0a2
SHA2569e7014b47bc46fb99483409936c10fa260ad4e3b2ff369fd40aa56577c6ab6fb
SHA5125566b00538906f424cfd5f91cfc7e646c6bea198f0fb3fc3c424d560435050ea979a0ccc543b5809e33204bd944ecf0f171db0dc5803329879cad64061f36673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548de3e42829ddac991ab4e24b1a866e0
SHA116c38b2f78f2a84cb6c9ebb6c48d34756ad00b0c
SHA256edbf6d0c4b495f485e27b0ff9cf77941f74281dd6528f2c0c5b1fc6fdcdcf937
SHA512ed16113b6e7bc1fc42600271903fa021be2f7942e4b049969d43e6e574814c8a8d40989bb5bab88c73878c3fe7eafe9a946ca8fa673945735728270bbe29d7f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac790ba04ed917b2fae17acda7eef32a
SHA1e8a8fde5f6f8772c85841f34fc8d7921ff253d70
SHA2564ccdd50d2bd5dbc1bf56773570be5ebcb99317885dc3acb552d1d1c02de5abaf
SHA512b964f220b3bb2f19428404e6ddda676a02cfc0e27a9078aa4d49ca8264994d9c0837bc7a0e8db7678dfbc236720172d2ee7c928861818a0388188e47dfbaf484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a992793837f74781fd08b24276b4193
SHA1932aa30c8c0731277930266abfaa265d6d658b13
SHA256991617daa83d7ae99a3ff62457062e08baaab8114870a95553540051032aba7d
SHA5128d882bfe90f0b70773ecac9d46147be741ed081ddda20a3948400259f35d28c5c204344453308a896766c68e62f0ec3f7cb2f9b34c366b310438c85b76102606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5684cc280e354634366ad2799af29e8ce
SHA10efbd75b809161747d2a14acb37c3f78d0aaf9c7
SHA256e52cc907cbd8be7c33005ad54b3e6732d46a09dc905beb8775170c47c8b8e47e
SHA512e62146372efea4fcb74cbb2b8d354e945ee2e7391f1db7ce87b3a684b1cb0084f06c71904eb3921cbbea2da4ce8ac14bdc6f97548272f12e7ed3bc1da71f4610
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a