Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 18:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_19f447bf03a5055f379751ec9d47735f.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_19f447bf03a5055f379751ec9d47735f.exe
-
Size
408KB
-
MD5
19f447bf03a5055f379751ec9d47735f
-
SHA1
dd5c17cd3ed77005e76d4572415ee8af88da86c3
-
SHA256
7c6dbf173631073895a2664383561c04e3e7344e0dd2a1e82ffd3267cafb967e
-
SHA512
70e4429c2188b9917042af395cdddc409c9a4b587aa20f96f47362168a65a98ce8fa60091ab70f5eb4c396812445ef0ab1647f8a00aa48f27b63142c450c2d7f
-
SSDEEP
6144:8lSDpABxavrQLKLl5enErwbBxVED8bR3javMVoyoHXI1pX:8EDpOIrQLKben5bBxaeRzxgI1d
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 4 IoCs
pid Process 4944 JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe 3568 JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrvmgr.exe 3200 DesktopLayer.exe 4020 DesktopLayermgr.exe -
Loads dropped DLL 2 IoCs
pid Process 3568 JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrvmgr.exe 4020 DesktopLayermgr.exe -
resource yara_rule behavioral2/memory/4944-4-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral2/files/0x000c000000023b24-3.dat upx behavioral2/memory/3568-22-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3200-21-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral2/memory/3200-20-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral2/memory/4944-13-0x0000000000400000-0x0000000000447000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayermgr.exe DesktopLayer.exe File opened for modification C:\Program Files (x86)\Microsoft\px780E.tmp JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3816 3568 WerFault.exe 83 3004 4020 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_19f447bf03a5055f379751ec9d47735f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrvmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayermgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{AFE900D7-D9B7-11EF-9361-DA61A5E71E4E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2222502095" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31157700" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31157700" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2227658580" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "444421817" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3200 DesktopLayer.exe 3200 DesktopLayer.exe 3200 DesktopLayer.exe 3200 DesktopLayer.exe 3200 DesktopLayer.exe 3200 DesktopLayer.exe 3200 DesktopLayer.exe 3200 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3044 JaffaCakes118_19f447bf03a5055f379751ec9d47735f.exe 3044 JaffaCakes118_19f447bf03a5055f379751ec9d47735f.exe 1548 iexplore.exe 1548 iexplore.exe 4564 IEXPLORE.EXE 4564 IEXPLORE.EXE 4564 IEXPLORE.EXE 4564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3044 wrote to memory of 4944 3044 JaffaCakes118_19f447bf03a5055f379751ec9d47735f.exe 82 PID 3044 wrote to memory of 4944 3044 JaffaCakes118_19f447bf03a5055f379751ec9d47735f.exe 82 PID 3044 wrote to memory of 4944 3044 JaffaCakes118_19f447bf03a5055f379751ec9d47735f.exe 82 PID 4944 wrote to memory of 3568 4944 JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe 83 PID 4944 wrote to memory of 3568 4944 JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe 83 PID 4944 wrote to memory of 3568 4944 JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe 83 PID 4944 wrote to memory of 3200 4944 JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe 84 PID 4944 wrote to memory of 3200 4944 JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe 84 PID 4944 wrote to memory of 3200 4944 JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe 84 PID 3200 wrote to memory of 4020 3200 DesktopLayer.exe 85 PID 3200 wrote to memory of 4020 3200 DesktopLayer.exe 85 PID 3200 wrote to memory of 4020 3200 DesktopLayer.exe 85 PID 3200 wrote to memory of 1548 3200 DesktopLayer.exe 86 PID 3200 wrote to memory of 1548 3200 DesktopLayer.exe 86 PID 1548 wrote to memory of 4564 1548 iexplore.exe 90 PID 1548 wrote to memory of 4564 1548 iexplore.exe 90 PID 1548 wrote to memory of 4564 1548 iexplore.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_19f447bf03a5055f379751ec9d47735f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_19f447bf03a5055f379751ec9d47735f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrvmgr.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_19f447bf03a5055f379751ec9d47735fSrvmgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 101764⤵
- Program crash
PID:3816
-
-
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Program Files (x86)\Microsoft\DesktopLayermgr.exe"C:\Program Files (x86)\Microsoft\DesktopLayermgr.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 101765⤵
- Program crash
PID:3004
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4564
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4020 -ip 40201⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3568 -ip 35681⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5f8434f362add5334f4f050f4b4b373a7
SHA1f5915cb0d72c8faffe11126bc29da1b1db8092bc
SHA256d34b378ede04c585c2bff8cf32112904e8512ee80c5a9fbb34ba224d8dbc868b
SHA5126c6b4ea2b0e37a346145ee2814789d9da4c2688aff1c3e1cced16a620e8dc81566670336a3fe8a510b1754bbac6c3c6ac20aa7e20359b9c322bb220b50ac30b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5dc142ff8759ecb81417ba231bbcf25d0
SHA1201681d524cde8af5c11b5111f5fa697521c5739
SHA256d6e2a573b1e137d8b823b82cfeaadeb30df36a0fa7a268a1278465b28fdc7bb6
SHA512b36456cf3ef37e4bbe0e4acf8b25cc85a39f8517d1b80b3191b1be7ddc6d58c74247b2d9dedb0b67ac4f8a2f3d92773e90aee326cfe612f8573ba6ad6b73e833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD59019af91bbe85cc069666dc03ce17a4f
SHA140d23831655b6eb1c9729c9e14d0e1f57482b0d9
SHA256997b0c8257c70c5099a904d01cc29fdd93f4c2df7b0c48fb527caa81251668b0
SHA512e787c2bdb2f491db34ddf2f749f9f10654f68fc0153a85f750bc9401c18df9f001fd6128eec7129474d97f4ffc22e977781ef4645c3cc4a43638ec12f91e421a
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
152KB
MD52c60a0eb60587e6e9dbd389576a30d91
SHA19fc335861b437bb6cb3079fb07e420d8f39a4b12
SHA256e8452f0b8c328b8737d3244729cfb9b5e4295167bfda075b2679c0c9978ab631
SHA51210f7f201c1c6a36d23df72bf333663de844b7dc1b7ab7cdfeb787e66bff2bc47cda3dbe96db2d6ecb2b33364923c8334310ba1a00937e7de3e1cf8e4869e3697
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219