Analysis

  • max time kernel
    118s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 20:18

General

  • Target

    fd8f78dacc6c2a9e09b843db0fbd0e8c_JaffaCakes118.html

  • Size

    119KB

  • MD5

    fd8f78dacc6c2a9e09b843db0fbd0e8c

  • SHA1

    ee64f68aacb60958ebea7fa4bb732ee1688d0893

  • SHA256

    ab63c1f4458caf6d6dec2906b98a79555479bf52375835283f8545cf5f252700

  • SHA512

    1ba3811baa17fa977a8de9ceaafbd21c50471d2af2d88c0821d7fe7210eb198fe5a67851370907d0da66a6eae50428ead73b475c8f4dd86fdec7cb34c285de81

  • SSDEEP

    1536:Sss16ByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:Sj2yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd8f78dacc6c2a9e09b843db0fbd0e8c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2408
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2440
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:537606 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2428

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      11f9d7550438365cca5b3abe45dca79b

      SHA1

      a2ceda43ac2b4d9072079e64bcecab060a80a183

      SHA256

      939d5ead8fdd1b832dcbc1c7a194897967921b8d335fd37a887cbe564c67481d

      SHA512

      06eb94435f5211ff7266cf860ddcdc1659a8af7434a3bb4f964f65852edd5226525f3170aad27af1a49f774d336967cf978ca4a060e4ca385dffd8a5cbd3ab98

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      32d83c9b0d779d48b70098cfb7878a7a

      SHA1

      37f2169e10449d1dcc82412b4148c6a47c234c55

      SHA256

      0e194ccfc1624a9570b481fd2b393ee0750fbc3eaad439f3ba87212666703023

      SHA512

      83ace22956b63a45427f0664698c2dc45bd9015e9159e16cf11c846f6685cc2481a5542fd548a233605a505bd3ae4ae8a1bdcd4a8aed13bf52ab4d9aef11d051

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      10284e5e360d1c4b43b696b0aea7ab1e

      SHA1

      a0869dbd39d2d3f109512ecfa88406001482a0e7

      SHA256

      5090e01572a59d04fbbe434b5359575c253343f9a465e475324a2fd812c787c7

      SHA512

      fb86c0c11c7a70667ba0949d2f93fa155866f224736ec337b05c4e26064a5100d8ed721c6cfedc4c01c2c6de66ccfcb36dd11a543c0dd7bf8bb62630beec4759

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d5a537634d4d83742dba5578cf1a78c8

      SHA1

      b6077e901af0ba9c65eb8948bd317f495fbfaf44

      SHA256

      815321640281b46253f101721fd1eb3761fb8766e2dc0f7ef342a03f531e6cc0

      SHA512

      b27c5940ca95f0e78ef2332ac063b1c485705b7197b5db25714077e7ef1e0f1f0c5cf5f5d600f4f20450e9186baea3a88f400b04ce1feb84b4d4e290135dece2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      59bd118a8ef3ebaa9af4844974b277bb

      SHA1

      1a419cd4e0c0209bb27ed5302d292e33011011ea

      SHA256

      7a41f8475c4171d2958b02425d2eb30f2545d6d4f223a260a78e99e544093fe8

      SHA512

      5c764fdd2097db51b4b6b01a00b44787379007c54b180d0284b7e7edd053ee5137e42efe41243cac93c44a43042e2c5bbd21026563d20b1e923e7958b4a693c7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      107b3dd572b6b21b74aa756c66ce2a2b

      SHA1

      544a9f73400d6306524dcaf9bb6475156d2051d6

      SHA256

      b8ed4827f20d715c8f80dded7f9dbd948369cdcb6b4f324f918736e70c403e6d

      SHA512

      22ad5cda9c232fe5a9a66e61888be02a3ab1981076b7680af2abf871031321ed8201e5dab167030d4f2ce71190d2644da997eb5fcabff75d6e19faedb6b5c171

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      310a821d19fe03ef1f2500ca26d94b57

      SHA1

      f8800f5cd3d8d3cc19f341330b74a0bfab055ec5

      SHA256

      3af39cb50a594bad6104b53fc686a03e29ef549f418fcd5615cc8774de009f09

      SHA512

      e53aab405be641994760af674592166dc8896d3a5bdf0ef66ac3a9229296cda7cef51ee53cc0a56865e175f20a5f8ffb178c6de600a1ede20cced34d279a9807

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7ab17f6c75f0a0d2da4307664951bc4a

      SHA1

      3f7186db6d2cb99503b6d23c289bde8d9bd186ab

      SHA256

      918b44dc57ab02046ae04bc21b327e12cd6911d498ebf6d318ae77186a86c365

      SHA512

      bb78e8b0fa42613f5540a4f7815998582271f3394f55f24703883b561317357b69c89949c2e604e38b1075ff5f216029c19bcd40783323567ed31bcbe1a66d78

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5d90c7f9a3f7a83978f0525c01d153bd

      SHA1

      83330d4d3620a116e6d6a335ed3da0f0efa8a4b0

      SHA256

      35f5fe92c48a0069bc4481cefa5d75243471e901b6a8f2db9e0652003bcb7cdd

      SHA512

      6eabe42a4f38debe79595f54e23ab84d2820891e6d929d68d03f27bec9d50e7e14fa49a03d994d85fe4dcb213226c1a030a6ec34a46aedea6cfedb619c38abcd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      480728a7a4e1e58a71396841a6b9a9e0

      SHA1

      e02907590868d9f9521ffed478d5d71bfdb0d63d

      SHA256

      5e410493b38baffc35fa580d832056abcce425a961d112dd7a89387f25e0d7a3

      SHA512

      6db29d6741e8072da3b686c404fe0ae4f4787a23ce98341771d4fdfd7a0173f8ca0c13d26d8cf867031df37fabd76c9e445843da43fcc4e92411f06e4d2ecab7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2e1b3dd378bdfc38854c9954bf8c834e

      SHA1

      42747fb577e8374aae99f4bc6e65a8ce06285be9

      SHA256

      cf668cf971fc76ebb40eec12a870d86ee9b83aaf826fc6efd412afb7cc5fe9fc

      SHA512

      2feecee234f21bd916e5eb77928fcfbf5acb66d048ed8369fb225f12eef1672d9ceea8c23010457995926f154678f91e05697dfbbef50f25e9bc4352145bb59d

    • C:\Users\Admin\AppData\Local\Temp\Cab435A.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar4544.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2408-26-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2408-501-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2408-24-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2408-23-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2676-16-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2676-14-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB