Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2024 14:51

General

  • Target

    010349225dd124ae4030ad4ab9ee3686_JaffaCakes118.html

  • Size

    158KB

  • MD5

    010349225dd124ae4030ad4ab9ee3686

  • SHA1

    c144b7309443a21df37f2f03229d275e9d581ea3

  • SHA256

    680fd5d553a13191742348c44eb3ec1f0c59ce66335b82e79cb26d57868c8468

  • SHA512

    85741d07b7b28209ba69f777a21a36e02d811100e1b604803661e4eb931c6100a78cad35169d9ab9f2d31a7ba41f364ae197dd9faca1139b43d9bed7fe7d3e81

  • SSDEEP

    3072:iCoBdp8nDqyfkMY+BES09JXAnyrZalI+YQ:ilBj8nDPsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\010349225dd124ae4030ad4ab9ee3686_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1752
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275475 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1712

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bc9fdee6519e4525234c3430b95a76df

      SHA1

      ef8d6bdb0901b38a6585fc1737c3892d4a83e310

      SHA256

      f3537617edc93eb2c51fcaeb7ed9dcfe183c4b9236d9e2f2a38350d2a1c7f539

      SHA512

      e37e6e83fc793043d3df3640722fb85d933bd337adffa2e9b7a3398c2b465396dc9b54cfe6ea634d932bc899d43f3ca7f460139289810f7cc361cbface8cce7d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7aa34e0cacfbf4f1f3bed180194bd35d

      SHA1

      385daccf15379fbbb8811dcb0d2526f1fc76db8a

      SHA256

      104483b942b148bb5351375faa365da995d601df5004f83c2484e720ed43255f

      SHA512

      aa12cfe48362b50bb11724f65dab893a24e6aa8d41966e3d3de892364542ca06fd0be057d630954d933a2eea088c3e00648dac6b230a4c66a99e283cafa8179a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f0c94741255a32759f5ba30691c72b68

      SHA1

      09dd8d32e4710c88743c6aa70be10e84038027ef

      SHA256

      31e18205390b0666481a6a0571d42d3685b7e6445298aa7570a18e62139b0565

      SHA512

      5d8ce6cfe25a212e297686588ae88ef042bbb52d10a936691c7db51721dc93ff1379dd278413ef23ad66e1fb108004f8d977274c571d11377baa31b801a627d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ec76870d68b48a439ad5cdf16b5adbe6

      SHA1

      46fe6db12937ac7dcae884b5c69957a76ec8bef0

      SHA256

      39ad62f361fd928a0806157bc1acdee7140587f8506674f409e98ff591eb4bb1

      SHA512

      9f7b7747602a3b127d2b55de09303f0f66949335f898350d46a4209a1df453c9cd847b1b5a7f06379b7c8450200d92e672b591af2274d558805915699ba011af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c20c80cfc46f8a2ab0de44aa7c289c70

      SHA1

      a2531fe643d15aec8bea46b35d8690c2dccf0162

      SHA256

      4d24fc29342c9c4d15878de5d869bd2191e02b9ff76535b4b424cbaf240ca0ee

      SHA512

      362c42c76ad7d5696918d152d91e3ef5f8c62adb7b0350f29c2657434d7b3b89d270599a7b1f18ccccbc738e28ce1eb350e7ad607f3f8dbbdd5ecbe37a8fb037

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      99102af7686ae75155179c2d2c32208e

      SHA1

      e389c5e81f3e7ac6b55ef226ad01ce31982213b6

      SHA256

      5908f6d670caaf3039a5bf2f208e13a3a86b2f389f4393b42d7396b4e75f3baf

      SHA512

      652c08490b8acead530583d1660885c678f115d93bb7450505db0b5b32bfca51aff7f1c016d0299836389c3958225c262c51c191005190fcc5b950c78061b41a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      abc9f64913951f5db43ae7ead1f58cf2

      SHA1

      ca99bf805a94d87fcc1a950335e86a56ef819926

      SHA256

      da2d4136f08a965ca3cd2a4d2be1d95455a89b4172c3cc910872e57af06bf72c

      SHA512

      f7e4a8c3e837a8de84db9ec4fc143ab9271b29abad84cbfbecb173f12806377e4dcef74cade7f70813b79195bb221f8dc4b2512c6e411b109d0ea77f2b86cbaa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d8c8236e87d41023787f1520434625be

      SHA1

      8187ad77236ab4c8236c85e432b7ad023827ca85

      SHA256

      ac520dbd1e3406aa59daab0ad3ed9207ac3331ddc08813b076046c49e34c7e02

      SHA512

      775f45a2d533963c0fc70cc4f563e8d97fe665e7218926a8253a730160867a17a870d26e015e380bd3faff4223105464e6721ff4c98e41a76eedbf5456b9b80f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      77639850e1a564b3c260aaf5c34b88e5

      SHA1

      9437e9d8a7c4d5fdffbf736deb1df66ac470a7ff

      SHA256

      bb669331377f2f8175091cc0cc8dab77fd8767da7fc6f0000eaf05f5b620b9cb

      SHA512

      5743899d828be8b56255e02f1f31a2441fe8b229b17b20fc54044b626bfc8380e12d1b84d07dd53acdbbcfe0a2bce6e2f3ae94acc1ed519f8bc0c6876fc9ea83

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      28aa16e099465277aeb965691ffd7abd

      SHA1

      5a9469c3149083c6e92c116650b4a65c27e6a298

      SHA256

      ed47a3fe1b593b6a59cefc5d4c964097c657895ddab317fe9df2ac723833f13b

      SHA512

      bcc16be885057606055b167f4b1195baeb693f51fc201d34e100e9e0131b0b918b6f86eeb88beb8fbc56d847566ca0846724d91fa87beb3f43f631d6f50b7b8a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b0d0b7c0bebe0aca0a4744a35d7c32db

      SHA1

      0a7c742d744a1de48ba09d707bcf4a561b06dee7

      SHA256

      dcd5b73ab03c4f2ea2f8eb7a6816368cc8a04a7451fd63cb3a64fbbb6897b9c6

      SHA512

      44516e2a5b5b8f94897358ecd3b17941a8a9db71b7f9916673a77ca98640eeec6a1b10fc4e09cc52f982b818fbfb59eed03e3761eeb7e7ea58896b2ee4f98166

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f8fa2ae2f4bb0d7ec33c049ce80c94a7

      SHA1

      5a12ab36cbb51eb245bfadc93ec098818ce545dd

      SHA256

      1303138fd4bf8902881f0ce73b68dd51ecf9c22bb60ff4906bfa4787a8a9023e

      SHA512

      7f3dde47d775c3a2eb1155093ad77bbaae2dfa289148957d26d6ec2588860ba6ccb8af3febeb98ca7f057f93aaf7ffc353c5137a3a636885fa10211e6faa6b77

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c8f70772ae044d5df8b4adc743b3f71b

      SHA1

      fc9708b737ed67ea5c59fd44859b33e357cee86d

      SHA256

      756cddf958bebfa01560e6c928535a06aa27f332f30774e1fe0abd84b17061e0

      SHA512

      2898691b332bd61f2d9e3b953c7efc4de9cd36b76f34ca0d6b7367eee817c75dbe93d737ec2491a26d938c1b758d01117248298dca00b65589d50a1c0d77234d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3b27c6679353969cb0637e37454d6a59

      SHA1

      0acd59d9c8b88f6a0c8a252352237e7d329c3deb

      SHA256

      5855e285ce27af6bc3f6549ee5c62847f3e88fc3b7300cbe12e86276b35c3ad8

      SHA512

      51e1faa0d43287c549a6581ca3ee2565a068c4df09e7c1c095e74411e9685cc2a9367fdb92c0a0c737ee72f304606f794451f28a98f101faa39f0645abe29d85

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7d4033085a6ffbdc1040bbbed9446b12

      SHA1

      d43cb48cfbcb8842dc89fd03b8cba87b913d8952

      SHA256

      24e320415aeb53d21d02569b20ef41a415c66bd5c21f097cd0dbd3a3a722f324

      SHA512

      c5b1cf666ff9a29fb0be735d037d05f48da6a560ee9255569edb1432635c1e23251aa630181e737c7bf3b1046a2473205abe11ac707e54f1e1a971eab6bbe75a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a9fd89babaaab7192bbc2b9aea030fd6

      SHA1

      1dddf6590726b8efb9ecb889d24328126108e6a0

      SHA256

      2aae983338190fa2f291a15502cef8e07ae977a16ab47eec310fc7c990831c6e

      SHA512

      be9ef47c7797c52a634ed450cb9a6fc0a8e7fdba13447382d6014b3ee2cb698a4d57991370ebc8f89c06a3742354e4e12aa13522c30dfc011ede5f247689bf6b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f883c45428fe544fa424fa2de1f8df98

      SHA1

      777e4faf53678174b17351777052519f01d242e4

      SHA256

      322e2225174f562f909c8091d85e0f7ef122ed2e66aebdc89225f87e7899d296

      SHA512

      9341f4b9c10850e8c4bee4978a902731e4099866af7265a43f5acaa661050bd7fab3a2289069c2fd2af31a5f1e1ca7b1ce2cf205cab7fe7d64a199192a294c9a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1ea4a0bb3642c0812756d7fe14051b83

      SHA1

      31282ad041c70922457b69a2039025b4a7cda298

      SHA256

      e26586c68dd3cc2d9c8408de2705e19b69f2421f67d916738962439d7ee0286a

      SHA512

      e9b663b5f7990584c14fc0a36117eada5b7dbb5f0cf157073eb594730c3f0a0f56805f287e23125647a276b7a6fdae59be929db323977d9bc6cab4d5033bdcac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6f9aaf334b50e457ea2f8e0aeae590f7

      SHA1

      0fd510ede8c746ba9e52f1e296760973e7e04e1c

      SHA256

      3ea78b42f57a416f546fe40fd25123b15c0df8a45dc6b3f95ec8cee5985ef33f

      SHA512

      4fb8a6e80b187b678824d1f19dca88ab6fcbeaadbda4d822ca0dee90767f771f3ad3eaf54a78d9ef63958299b9dedf7cf192cf9f1c5a2bc40673b7103f11e65c

    • C:\Users\Admin\AppData\Local\Temp\CabE16.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarED9.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1448-489-0x0000000000240000-0x000000000026E000-memory.dmp
      Filesize

      184KB

    • memory/1448-481-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1448-482-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2820-495-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2820-493-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2820-491-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2820-492-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB