Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2024 12:52

General

  • Target

    00cfd9eb138b7e1f864e21e13b53fc35_JaffaCakes118.html

  • Size

    127KB

  • MD5

    00cfd9eb138b7e1f864e21e13b53fc35

  • SHA1

    d0964968b26bdb5831fc60b39cefe15aa8cafb0c

  • SHA256

    4db2eb09d6c5b3ff0299ea615a12f5f6efabee9de433cbfabb67639737c27073

  • SHA512

    2552f07f6aa9ec6bc17915407a8ff35192413952a52422a726008a6e666053844ddef7cc4f7689bbaa27f94ceb7faf78e3993bc29dc0faea5614dc76099f4e07

  • SSDEEP

    1536:jzuYerk8yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:jzL8yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00cfd9eb138b7e1f864e21e13b53fc35_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2740
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:668675 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2464

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5e5d5e28457cbcdf92c2468ea667d6f3

      SHA1

      70094924252eeeeeab4a7f26fff0b2629c35214b

      SHA256

      52ffa484eccf1c84b099d1f95bc817530d6ed8b6e23ef3931d033a7b4a46a431

      SHA512

      93ac1e630cdd698adc12943c61486ecd87ea5bb4c40c0754cb058ad30f3535d7dd619f8570b01c1e0f8d2b8c469f32da7df368a9e93aaa453d9018fb439c55f1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3410f9a0b44f9e4fb7b179884ab1ee2f

      SHA1

      f324e006f15c3bb949fb73f6f7de06d44459f091

      SHA256

      0ffd3ca877b3265716bd3207e34956a0ae567618eaeb852dc8eca97fed1c9c2a

      SHA512

      ebf61befea2b7f124d4c80c318541e69b1c7f233699cdae19d9e71aaf037338aee7026144805b45ecf6103b4b07d6fff42590a9ebb7f393daa0240a9e0aa0cf2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f063f226d960259915705b01f1b6314b

      SHA1

      5a6fbb0d66e1d24ff5434de24a64835ceebf23d0

      SHA256

      6b0eabb447b16cf51d256472fb97bc2fb374e048664ef98e2cac2ff5d1fbee6c

      SHA512

      b89cfa9fdce433a4ea6054faa005c9fba5b0064dc93caa0692684e507cd8847b43c6604f14a5bcaaf77d023b2ad720bce8127c207ffbac66fb122b1eef79e466

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cd4ae25bc891eb625a8ad0b32c56cc79

      SHA1

      5d0801636e639e7e00442ae0b0fd735046d02224

      SHA256

      e66df470525eb7e68587f7e3671e15f739e36769d8b316e7d6a5cf2b0822b957

      SHA512

      2567fb18f16403f257df581b1de57f80fa482bb12758b9cfa6084b6b3a9dd13a4e698e7054aa1c13f95184010005e0e18ea5fd8a570dbc7f535fdfa43a25d66e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0fe162fb9ce43a578b1ceba7489b1fe1

      SHA1

      f3fa8ae486d357b26695c62119a938d8b136763c

      SHA256

      14496cc78e47e51ce4c260168c4ef13777172ca50dbc7cefadfb83b8f32a3526

      SHA512

      34ac6f680d8d8b4f6fffdafd55ee559d64c99e4762741aaba9321a8405457bd5620ff521d3ce99fc8104f822d34115562cc105539ea3918f81a1a83f5675b67b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      43e0ad26ede9971878dc31756e718b08

      SHA1

      9acfd61c9e136cc8411d2df465dba48919fe47de

      SHA256

      5e0735cb2e02c3c714c37191ba46c8f5595ba3fdaa82e2b8e7ebf01506be8c25

      SHA512

      487b8b037ea523388a3d4a8bf645a9a9c4be1e9c1e3c1b56efcaf490f7483162d25ddc0839cb92371d2d1e9aafad8362f273cf7c4dc0f46892c18ce167ea6355

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3aa99d8a093b00eff48504fc2fdaaa6f

      SHA1

      2498a103af3ebc483a2a089035e3d92ab6b1de1a

      SHA256

      37c8155fc696048c3ba4438f3312fdc45acd5a15e8eedbe13f8eb48b7d1b37be

      SHA512

      5cb4fc025ce64420e08e07665504ece723daa6896606300e41f5095801313880d71920a1ceaa4aefa6acc5787baf4348540c642c9ca160607d93c26f1c1e51c5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2d3ef677fe02274ce58c1f871f5dab9d

      SHA1

      e5d98b132b1595f7b8a09560f592b2edcaba2223

      SHA256

      42cf01d3b9e188a9fc68bba3da21823a0ae75a09c11e8af88f3f41a98c4ecd5e

      SHA512

      aadc02966e638502fe801ea6ec97a27a6057608cfb72719671862867491a433d0bc51d131a1a3b7efeac458b1da8ca3f6fc48a2ca473c6536491309f35623bb8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      30cfd824b4e03f4cb45a3cba426f63ca

      SHA1

      cd5142b88a7c5b5c069875437135684b475d99ec

      SHA256

      1dbbf20a0267a2af6e0dc2d094675a05fc47d7c0bf560f3d9ea7605a9412044e

      SHA512

      2750324aaf98ffd258665eb4d5cb8c2cc968fc1f46b9c60bd272b146c78c5d6843ed7d19e8300f71ce3bd856062468d1872b96390bfaba8c1432b941b38da774

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      db821bdce80bb9ddbdc3e0ba0d355dd1

      SHA1

      6f72d315de16fb3429f65287a0078f9546a74cb5

      SHA256

      f30ce595e02898038ccd1ce7f4ffff391f529ca68f2df2cb533e8cf00f5486f4

      SHA512

      698c824e1140928b73798ccbe22127c0653f08b5a9c11fb07fd427d1c368babb2a39447a2445b9b8efb3a6790144cb418edfd82fef1a52d9cd8d42395fdde5da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c3fb1659f20244313f6a50ad5cc7c441

      SHA1

      0e970aa4d9abc7f82b2f246320b75897d9c275cd

      SHA256

      85e44f7b98e7d152c9ccd31b518d79d0b9fd4b05d434d659e39f9db02fbd953b

      SHA512

      053025e1155761b6d7f79b6432f5fcd3b08f8ee8e1ecec1b3f725b21facd8677a1586de47e4862a9fb558620af58737dd386cfcbf9f4cad05fea21bf858ce1a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9100bcc2c898a17cb9cedd91f9b83195

      SHA1

      4c17ce6de730b6499587b2a3dcc2ae9a3e4f0ce8

      SHA256

      7b115ed3fd4756a5d3333400ac12d8becef34c2844a03cb9428532dec9474662

      SHA512

      5e48b6bcfbe59990fcf5dcf1dbc3bd704273b3d8cb19d707660b1801ff72e207dc9e2e0303d38aa13c288dafa14e1bd3582eb1836b41cde7abd52806075247b9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      96de71e23de23a447d253df204f4b556

      SHA1

      db4b08c62fca532fb947faab6966cd4fccd792b0

      SHA256

      5acd88b8dab86c51bfa2682ad2a664c31bf3a8f1cf6f09ed40a8848494cd13a7

      SHA512

      1db4a6db237828881ccf7073f2870acf40cdbdc718cb472674f14c75feb4989ade7da3df5cf887c2ac58ae73ff55558e5d341327a14310a55864cc992a2a128e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ea33a33a341fa136896efe13a2502e85

      SHA1

      92bb38aac8696aa9a0b1d3a034b44ffda668c41e

      SHA256

      f21115a2bf54bd9d2aa4b887025c35f6162a1fa032b3eb5ca5f92c2ba23a2176

      SHA512

      cfa7a148a8546932fd04eb07f916f43635cf3140f0805ed0e7c2cb34c8de8ae96384b37b22203906799dce7e651a6ce9c1147e5c4abe79e976186b198ce67fb9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3853c17e65e3bcf5e4e38e5513d79ef4

      SHA1

      47990ecc53b245a75b92b7b06bdaa9cbc1526700

      SHA256

      427f7030a523998821c99bdd9a4a187cb572e9e111eb0dda4824e5a73b3b0787

      SHA512

      5f385e7446a5bdf916bc52f1f7b70a48e6ecf6e67547f8140eb5006595a64d08fe903827e7075a31ac62e1a5fa57e0e11f3b90bf1ec52958edb5257e044e2e8f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      385e791b56f67e736b32809b61dc2f74

      SHA1

      3a1eefe41ad8076de65a21c7605c4ed1429fc9f1

      SHA256

      9b18feb22fb6d5e1e1e21c3a15a60e0febe74750f47f74702f503a4984729d28

      SHA512

      14d225ac2d31e6b3e2489e39b5697e120831d93fc76264e1ecfc616c4e3b3962ad9f4a841920573d3304b796a9decc9cd84cc64830caaa3cf44f4c9141a10dc3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      29ce4820a201dbc63fd55f6c1a3cc7db

      SHA1

      22070e73cf07ab03a620a27807507d31310e8c57

      SHA256

      da52a6c14ac6a0f62a35b5447a4698b66ba3dbe4bb8f9ef49fe7b54983902a92

      SHA512

      75efef43b8f78a0737b874ed79974048c9311d3f4345b383603f706fda8e4d73f14c2fa2c08bfc48a2ea02867e5840645a394fa93b17ba4935c90f23efa240d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1463aa5261d224032d8aec7102e00563

      SHA1

      8a9d7ce158aa95836cbc308b23e88f105fe18c5e

      SHA256

      e2d1b8df3a9f6103e5dbbc83ab9debeea4559da42fcbb7371ab33cbef8299a33

      SHA512

      291094d9d224522bb6567b232a895e876edf2f3b7fec54ee364238a59acc55af3efc18230d72decf29a98408da6405fb9fe78f802c32bd48087b7fa468ef2b96

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      45e486f9f89a59a23fb7eeb7012dc92d

      SHA1

      f545ac6df7514c951d991b77fae8e38c60f67ad6

      SHA256

      d64950e65b2f04fa6ec3da7491ded9d445563d3cb082c687279b545c25f49815

      SHA512

      c25c58c7d43bf512d0cb3c857b0db350945f6f68c7294c95ea88a43ad7ccf1ffa870be9e07c3c84e18137bbbe915765d59797310dda81986dd12b0e738f932ab

    • C:\Users\Admin\AppData\Local\Temp\Cab4147.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar4219.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2572-19-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2572-17-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2700-9-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2700-6-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2700-8-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB