Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2024 09:07

General

  • Target

    007041eaa8e2275ffc6a60d623bd361d_JaffaCakes118.html

  • Size

    159KB

  • MD5

    007041eaa8e2275ffc6a60d623bd361d

  • SHA1

    8eec98b0a72091753c9dbd6f72405908f026da75

  • SHA256

    22b0143fce9e963aeb80631fd75bff8c4fce44af98e680dd671a7042ea02804a

  • SHA512

    476f9efb69f29251428bd414aa96a061bbeed28a505f2a7e404879db36280d34f4c6c82b4bb11d929eba8d3b4eaa94200064e2619f66af630eddec929a05ecf1

  • SSDEEP

    3072:iBSrifK8OG7FyfkMY+BES09JXAnyrZalI+YQ:i0qKWwsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\007041eaa8e2275ffc6a60d623bd361d_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2224
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2036
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1596
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:668677 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2600

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      00c9c695818d737d74f976cd2a0270ee

      SHA1

      ce44915122b76ad92d34c9bc5004a82b21b4606a

      SHA256

      7fc95bd0c7b141e7b04a4daf8d5cc930964f92036e342441da3738bb05096163

      SHA512

      1744d3ec1d10228acbb996a668e9973a7ae730fb4e71c3fe376fd145d77aa659850ae1b88f9e3e910667ca55e3fc4265adf449594d27fcee18587aee1bf122f8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      aff087b588998c4caa2e62e5e83343d9

      SHA1

      b6d981836edaa3399b1c7a9d8c6ae145d64b2ddc

      SHA256

      a7523ea98ededf84db1421632a4f1a15801d20c6508668f35b57a455bcadb241

      SHA512

      37a741879e631802106a958e1de6d8ec3eecdee5ea13be6504c5bdfe543fd8e04d8db2151b269584509d4b315e147bf0a686d8b563ee2f0a53a20a44c2326239

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9e3f4802ecf5e05c3b654edb0539250f

      SHA1

      d4d10214da93063668309b8e63fb78cc8c52e7da

      SHA256

      4bb2292df434f30bcb8f84584f76160f4b133313a2ba8619f625703a818a45dd

      SHA512

      3ce9d8b61254f4c9af2de6738b9ffaedcff3f5fbe4fc9a666fdacbdf58291b843503f63cf8f07e4bd1281f7cab2b068eb342116f3252ab1d3ee5b75713769464

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5765bcf8ff2c19b245260905a448e352

      SHA1

      c93ea5a3fbe5a9bf5bbb2f77785ea828a29bb3b3

      SHA256

      9cadd6bd60219ecf0859e478dc1dba96863b1ad7142b1d3ada21efd69f97bf84

      SHA512

      bdc2cea81ac490a1cf2b7ef402941053ad4c3771f06639bbb69993cd7056b1d2e3e83394e84148de7cfbc112d3f06e7f7fcf288fc7f0884e92268bb3835dae59

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9f237d1480bd9ca14f9ab8fa7cc71f72

      SHA1

      c07e9413d037be0fdabf23435e080b6e03f65bae

      SHA256

      55257792ca0e781bb5f88dadedcccb42076d7a99e8875a774a60481786aa1aa2

      SHA512

      6cc064ba01fa539b998c010faffd2354381fc3660da9e1a6440630a4b1cae55e84f1e766135dfec4f1d514e837f4e2c10082feac375395449b6cdf9cd66f1d79

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ee74b5c86556492d4f9b2dcffa2d60b8

      SHA1

      2b2992c41c1caba9d08d5a236c72a35c260b1e13

      SHA256

      d61d9c7ec1b4c48aa84925376b1e397cc05743252ad970ae10017252716e8406

      SHA512

      d95139aa7f41d2126b47ac94e850419fa4d5cd8a90be2fc8b7346531e95d1b5e43490997b6f0e5869bf2c17bf800c69b309429fc1ba3426347a8519d7b9646de

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a3f5a692b3fb489409ce3ef17d05b5e0

      SHA1

      4ce8eae6edb59e3622ebb7a49978c1b5df33c91b

      SHA256

      5d7f2178891b0e0e58949a8f19f03fa704cde536c4fd332eb57141cc91e8793a

      SHA512

      42b60bc5b6510019ef60ed6e69b182c9f41f0c9e92c00ba52bd7c86c3c9c712f6c6c087de09df81d1df3afaa2d035a65776fbdbf1c157aa0c1458ad2373a5ed3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9b05fe2c8f31e001491efc1bda78d4f0

      SHA1

      48aed6d355d999ad72723a0a0a13493d47ca9586

      SHA256

      166e92fceff226509cf2d756e45f10bc74a93d8172f857bb22f45f49ad3e5c57

      SHA512

      471b3c4b15b08380c7e34fea6e3c5d9e54914e86af7ed8577098945747883ab1dacf5c4489531fcece7c75c2104abe50be2d5a3d0450c8e8e812cfc73d427f95

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      69c1a0a7e2bfd106fb22f13c443de399

      SHA1

      082d29d24c0127cc4430b333341808ded32b390a

      SHA256

      5b873e9c8216b9290798b70c57054b583d10df49b301234d8fb67d5c15a23a13

      SHA512

      8588bfa6a0ab352945d0f0b228d48d39f8b5024a6276d863e1df8b3c2d86c414465c1d4b0b615e9a8ce10083d637dd97fc40ea51bbf630c0856151e815e817e4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      91ec2b9a2d33b8640eab3d5e48ef9633

      SHA1

      d26310551a1a4f99d3d6928fe75614f038097fae

      SHA256

      178f70858b604298c9775e0d20e92f11614d4dc2b062a58d8f01861c7cdc5d09

      SHA512

      b5c744c3016a2164bb89006af95aaf2df350363667810e5fb9ea21c0a7592ab00ecc2cb68b95d54325005c5524ad0ad28f945773fda315783ef9fc5a0061b53d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4e66ee527568b88c9969d436e70dbdf7

      SHA1

      2bb89bbaadd63a653b7cbb62024108ac8bf96353

      SHA256

      fbd6b5c5b1b69219516fa2694dbba24ee7f2bba0aa7133f84cdf454d2baab2b2

      SHA512

      76737974e47b097d266168b752680f25cc4c46d6d583b0f0e1fe465ee66640c0b7194574df83d29ad703cd87f02c67463d2d27a67de1f55ece6ee84e5cd6b7e4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      60b7c8c18c254570447426f3d1f1c4d0

      SHA1

      72dfb86296e680e0051477eb526914170e9eda04

      SHA256

      5862de8a27531149388421dc393c3e070bb0498fdb21c97f701a2a9f6bf35423

      SHA512

      f3bd23467f6896365919d61be54d6e67fbc7d555e8ad4c30d61f9d16f3ef288217a3a12939c160d883b8cf3469ffdc1551f012046f89961ced46d419f7e3b593

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4f17401571ddf060dbbf25e2f7e57926

      SHA1

      19158a753a2c059d43047d10b184564f4b1f6b7e

      SHA256

      38fcfc14571e4b1678d8ce80740b25166d1f5b54046859f1209f63403684d8e9

      SHA512

      00be6fc7a1ad7815f324b75433d133c0baf5322cefead82913c752925e33e2baa218dbfbcef2028f2f3d2df46e0da7f516459fd51d96bbc92ca1fe3679a4049c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3f66f34e30198dc60c238b4ab0493785

      SHA1

      f889e28a1be4cabf9d3b683974635193920cd52d

      SHA256

      5c767b91b5998a5cdb29694274b1b36ecd568f82872fabc3beb38cd031e20b8f

      SHA512

      ef66138c387b038ff24e8533a44a1d09921e2c671a80d1d8afbf5d18600ede063cf4c9af1d82799c786acf07dec5f08bf2cd5611f877de17da7cd8eba1936041

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4b3ceb35dae17b4b1bfd23b5832d9b01

      SHA1

      e7a1db788214722e3bc53edc6c939c7434ccd030

      SHA256

      0f941830c32444f8704e16a2f9772ac981488a1febdd151e93e5bfbbf3f4e37c

      SHA512

      ae1864eea05b9f9591eb8f212cf733d1c7737c77ce9ec8d9c72bf371e17d8980e2323970252197fc131cb7a7ee2bd2d057bd605330396a59a5ad935ef4ff4bbe

    • C:\Users\Admin\AppData\Local\Temp\Cab9187.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar9288.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2036-491-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2036-493-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2036-492-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2036-975-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2224-484-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2224-483-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2224-480-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB