Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 05:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe
-
Size
154KB
-
MD5
6a72c0412a98751e6c2894b585d5c14b
-
SHA1
931f4566239880c3fa113f6bcc0f62e58657dce5
-
SHA256
81598c6babb6f237fc59911bb674f349bce9c4b5314afe3a8b00c3923856b371
-
SHA512
6fe0adbf369de45e610eca634e168d64d756fa8c096e980c7db37f3b004346e98314b2fcc12bf50f46acc25a69d6a65276fbb6a9f9e9ab7b2c624dcaa4f5ae1b
-
SSDEEP
3072:zCDf5EZywjktiW5UZBL6oOYBcjBaPB6iS3b4Dac:zGh6ywjqaIYWBap6iS3b4Dac
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1156 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14bSrv.exe 2160 DesktopLayer.exe -
resource yara_rule behavioral2/memory/4696-13-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/4696-12-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/1156-5-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2160-19-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2160-16-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/4696-22-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2160-25-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_6a72c0412a98751e6c2894b585d5c14bSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_6a72c0412a98751e6c2894b585d5c14bSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\px9470.tmp JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe File opened for modification C:\Program Files (x86)\Microsoft\px9460.tmp JaffaCakes118_6a72c0412a98751e6c2894b585d5c14bSrv.exe -
Program crash 8 IoCs
pid pid_target Process procid_target 4196 1156 WerFault.exe 83 3748 632 WerFault.exe 89 4936 2856 WerFault.exe 86 1476 1156 WerFault.exe 83 1212 4696 WerFault.exe 82 1712 2160 WerFault.exe 84 5076 4696 WerFault.exe 82 2800 2160 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6a72c0412a98751e6c2894b585d5c14bSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153566" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3110147541" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E4A8DACA-C991-11EF-AF2A-7ECF469E42CC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153566" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3106553655" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31153566" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3106553655" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442646371" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 2160 DesktopLayer.exe 2160 DesktopLayer.exe 2160 DesktopLayer.exe 2160 DesktopLayer.exe 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 2160 DesktopLayer.exe 2160 DesktopLayer.exe 2160 DesktopLayer.exe 2160 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1392 iexplore.exe 1392 iexplore.exe 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 4696 wrote to memory of 1156 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 83 PID 4696 wrote to memory of 1156 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 83 PID 4696 wrote to memory of 1156 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 83 PID 1156 wrote to memory of 2160 1156 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14bSrv.exe 84 PID 1156 wrote to memory of 2160 1156 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14bSrv.exe 84 PID 1156 wrote to memory of 2160 1156 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14bSrv.exe 84 PID 4696 wrote to memory of 2856 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 86 PID 4696 wrote to memory of 2856 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 86 PID 4696 wrote to memory of 2856 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 86 PID 4696 wrote to memory of 2856 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 86 PID 4696 wrote to memory of 2856 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 86 PID 4696 wrote to memory of 2856 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 86 PID 4696 wrote to memory of 2856 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 86 PID 4696 wrote to memory of 2856 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 86 PID 4696 wrote to memory of 2856 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 86 PID 2160 wrote to memory of 632 2160 DesktopLayer.exe 89 PID 2160 wrote to memory of 632 2160 DesktopLayer.exe 89 PID 2160 wrote to memory of 632 2160 DesktopLayer.exe 89 PID 2160 wrote to memory of 632 2160 DesktopLayer.exe 89 PID 2160 wrote to memory of 632 2160 DesktopLayer.exe 89 PID 2160 wrote to memory of 632 2160 DesktopLayer.exe 89 PID 2160 wrote to memory of 632 2160 DesktopLayer.exe 89 PID 2160 wrote to memory of 632 2160 DesktopLayer.exe 89 PID 2160 wrote to memory of 632 2160 DesktopLayer.exe 89 PID 4696 wrote to memory of 1392 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 96 PID 4696 wrote to memory of 1392 4696 JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe 96 PID 2160 wrote to memory of 4584 2160 DesktopLayer.exe 99 PID 2160 wrote to memory of 4584 2160 DesktopLayer.exe 99 PID 1392 wrote to memory of 1184 1392 iexplore.exe 101 PID 1392 wrote to memory of 1184 1392 iexplore.exe 101 PID 1392 wrote to memory of 1184 1392 iexplore.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a72c0412a98751e6c2894b585d5c14b.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a72c0412a98751e6c2894b585d5c14bSrv.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a72c0412a98751e6c2894b585d5c14bSrv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 2045⤵
- Program crash
PID:3748
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 3044⤵
- Program crash
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 3124⤵
- Program crash
PID:2800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 2963⤵
- Program crash
PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 3363⤵
- Program crash
PID:1476
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 2043⤵
- Program crash
PID:4936
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 3242⤵
- Program crash
PID:1212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 3202⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2856 -ip 28561⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1156 -ip 11561⤵PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 632 -ip 6321⤵PID:4612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1156 -ip 11561⤵PID:740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4696 -ip 46961⤵PID:1768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2160 -ip 21601⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4696 -ip 46961⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2160 -ip 21601⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5d3ef026dd88e6e5106ac84f80286c124
SHA175062b0190d63b6ee191c2d3fd7deed40520a363
SHA2562ecb929a03fb648afd921206e9f84eebfe98b3b343061e6d2e5bbf3a1d02619c
SHA512809dafd4a0fb9c3c22d3fff05ebb4c025b35a69b514ddb082565a14b3543581f1c430532b6dec2dd4da97a4c9b9818b57d91dcc6f91a3a5425f5a65a078cf64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD58c473e9f893eaf3cc828d7595309a0e5
SHA1b17cff734139d2395a6dcf1dc60ca6c5de88d69e
SHA256de4a33117a4141419b051cbed22719eda16429b99063656781ca0434eea22b0d
SHA51215066ad2ddf145d4d32674b8106a9ad480d77bafdff5320d82c1ce85a49d47ec78da869f622481072f044da8f53d68d37c934fd3b411f11a6acadce8891aa948
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
76KB
MD5395eeaefab2ddeb8384cc1148372698a
SHA1df1b8db968cde6b267504617bc67436a2feb4289
SHA256843a48356f299924f97639a8079b954c88e1ec20cb2bb936386c2c471c098e36
SHA5124b6848f3d481a84403cd3ff72f7b5b4a9323a85e8a423dc4e07e948387cf0ecc4902f25ccede5683d04a7f100a27f11d4edfdb658e344bd32e9c648fce32c083