Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 14:45

General

  • Target

    056d33f9647560e8db04db164d5419da_JaffaCakes118.html

  • Size

    158KB

  • MD5

    056d33f9647560e8db04db164d5419da

  • SHA1

    0f00176bf7b1d49c717ce0c438fffaba27d15ae6

  • SHA256

    42923666f50a9c8eb9b4a535f6b151e6e6d12d6ec6a399fe088aa5d91fb41807

  • SHA512

    6bf24ec4b88a87d676dfbfee9b0c2800ccfa0d89daee5a0b6b4a9cf3c7182492ece095fda4b2beb5e3d64f58e58395c4ac9361206f65ff6cc35838623cac940d

  • SSDEEP

    1536:iuRTc3NPD2cninFWyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:ikDOqWyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\056d33f9647560e8db04db164d5419da_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:876
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1608
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:406545 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1980

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f139f3c990b5948a9edf36264929f310

      SHA1

      7ef24d402f046865d1a21983bd8f45b51fdd0280

      SHA256

      ab12611e21ca36a67a62e7207caf2a647eaf1d252a6fefda80d34a9d908684a5

      SHA512

      4ea6dd8ae36f8b441a8c28dc487136bde3b3a649347ed6047980e8ae52f7ce8f7425bd341557fd13da13517f361e1430b1df2b63561de76f665041fa2cc9f6f1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5f7bb78c53a13432a59c6f977ba76e78

      SHA1

      f8c7c2e373b3f434fb1b3c87bcb0424ec46f1d1e

      SHA256

      c1583d90bb0e8f44e1e219cebea3d01707299e38c9d2c1294fe7b5bda70cdbf7

      SHA512

      417389b3d34de997cf002144d5a829a0e34bc0ac44d83c4e1939220b548830cfaea806dd5e2b9244f1a3573c142d1d30cc9f8a2fb1972bc2ad723434505c16d3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      507be207a268b7db9b74d8d3aea6077d

      SHA1

      af52cd9196d72c6553aa8fbba240297ccf1bd955

      SHA256

      1432610ae160328ea7aa8eee31973f850161f8e595e0c2099610b2df775e4725

      SHA512

      c6ce23fceb7dbf96068987dde6873d659b89e66b9db8237f1516d2013d3fd9eea2961d0d2779b208b70c9c0bdb2923f861832ab80a28bd42762ba5f248dfdc38

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8859d3f03ea663fa1af0d4be0f47a0e9

      SHA1

      505f2a0b9e6e018006ffc324c64a36f6eb84ff7d

      SHA256

      0dc6dcc383e3fdec67f97fa29e03efc78addde8a221512029ae7e25e0d32adf9

      SHA512

      b952af7976c57243c23e151002802425b9f2559e125116e8b20bc30e7ceb92f99199faa1c6242ed790c339a96eaec59c04525dfc0b3e0e449b8cb716d37ad8fc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a998f4c0f9ae868262e8bd8e42e62d4e

      SHA1

      0bd1b07e1200285fe75e6b2be442d32cde9b6cc9

      SHA256

      4ab7b5c6cd6520c95fa8893bf1bdbdd2c73ecc50b2dd6e6252f467512d395856

      SHA512

      0834d60b5f3614232507997c4f94276da4e7d9cfb0730e0a3e351ae0b10f06850308878bd9c742ba2cc622554f946245e144e9f7366a3392bb8a3361b41ea0a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      935e7758664572c46538cd736a7ccb27

      SHA1

      0b745380e78893699a4999eae37992f99ef9867a

      SHA256

      347d9376da6c7a539d9d1de55cffdfedda6075dd09083ccbfdd5a4e159f7fdd7

      SHA512

      968fa695b4c233eb4d67548d1e21d387b5cb5693fbbba38cdc86999307298f55823b51f49ccfd27ea35027dec5196920ecb5c29ce0622d6553e7efaf1b0fc2de

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a0fd7edf974ab37221ad554ffdbf2fc2

      SHA1

      b9d634d645837a8501faedd0ac35168d4d07af27

      SHA256

      cff9edc29880bd1876ce057a179ca3212a71758c499f7ca02a6ae6ddea2d6688

      SHA512

      c1854e11e29b2024b52f869ef54bb92513a813ffaf7bfe3df2ef268021b578f802281690881b213e6d1767e4988f1f039839e5c876037324980721ed6f688e5a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5c22ce201039b183661b1a35c06177a5

      SHA1

      1e5a8055e36e9913c7bbf59f084dd75855bf6984

      SHA256

      96e55d303a5dcb64bc4c9b4bf8a70860272f30e973c96b677f6ce3a4b05a0dcb

      SHA512

      05d2eaf475045ff2162d5bea76e24a5d533bf19891fe9732ba866d0992156578fc7a0eb988905573e3442069e73a41bbcdf030084f484cad62b0cf7dd2536fac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e9953d7058b1c52ed16b130887cf3781

      SHA1

      301c8621f3197812778f98b8165fd28ab26d8dc8

      SHA256

      01e0443d3c830ef144f4f4433c50e4c5806208a25a0df182adbc6294f85c6ec2

      SHA512

      d938742d5f494d147d02e5b8f4a29a4027491b571c37dbd38c386dfd3478accaffb21b2254d94639dabb366f9e5ad46d733d66167a314fcc19682082bd8050fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      74eb5f152d57f5258427a052b5c8eccc

      SHA1

      25c9eabaa917f522bdbeb7f8499ae8a041782a3a

      SHA256

      54074c128803131e3f50f2bd7150b1a8acb44a1d6d53e60f9ae3a18a8acb2904

      SHA512

      162eedb64cfa5fd67e9c9ad33b07c10eb327f9a026c42fcaa958b3e556e18517dcfff4868ecc5ecef2f9be3b6fc74ce3710b61e2bafc5002fe2a644efa9dc1f0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bc4307ed02067ffbf2e594004c0a502a

      SHA1

      f5cd978c09685e635b95c792da3a8dc2369fd467

      SHA256

      c7740fa2e3d62a2dbbed637a88e7ccd11e263e03fe8c7ea49942fe57609419af

      SHA512

      d71efcbf4f2e1a6039c0abd4d8c74d54e9383eb4a6a2b38753e5db0be58530fcd2c100f417d7631f3fdaa390b752116c616aa16070044474a5d621bf8d63fa46

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5f95ff43089e40af3c13f49b4eb0d8f3

      SHA1

      b24e544ebe08feb66166d432a1b890961adaff58

      SHA256

      0779857ec6c7b9d37d84270d808f022beab957f0fff2ec317bf184e170eb3a11

      SHA512

      8a5450f0bba5ade45e57140be03d842463841b72d5f0bf1beced9de3171b2c97ba3e74fa68e61590f277f75c460ab0b945db8410330fd963b59dfb64bee2c500

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e62deaca0f6e676c7722d713a7a739ba

      SHA1

      9bc79e662a3ad6ae3172969ca1f24727796fbbcd

      SHA256

      8d0dff3d992405260e9b8af5f856926b672cf71ccd3694fc2b31e8804071314f

      SHA512

      b77912bc3c79158289fb20df87155ef32dbaf67b39b74311f85f73aa531fc10400617d111e299b2485707ccd4ce865cc5e37429d0abc93c20162c4eb1844c79c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9df343bb02e31c23b6d44f753ea494c4

      SHA1

      25119733c0605d57fa340380782e63cb5534c332

      SHA256

      8fad21bad0f67fa9130e03e4ed47ba4b4466f8cb4cb714af74494304d3c46a43

      SHA512

      c678bf471b5864c65fde392e42b4c35e4ba35804a01c1dcef32f1534b6c3ca6e5ae5d7686557d2cb524858d95c3917e7afffba4a8852b942274c9d1512b79d56

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      93d416323effaf56aeaf6445ab327aa0

      SHA1

      821040e9803fc7cb3fb7b11f073c42d78956c150

      SHA256

      d63fef0a92f6bb19a28001745557da98ece0057ceae32a53c24620ca32d932d8

      SHA512

      06b15428a0d7d04fa76a907fa51aaf53c34a37418d3ef8f7096bbe8242cb935b32f5a06839c32d900b6845cc4ba391f5ecc8ff7b4acff2965567da96ae0857cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ee60684d33a1f3712dc0897a98b0a945

      SHA1

      18bebce6445f0c34a20ed55579e63f0f63ba68b4

      SHA256

      4bec2035b14269acc587a8fea7bac71c16b06452716cf173c631c2ebbe4a64a1

      SHA512

      c1796c3aac2405681212d2e1a1b8b1398479050c099081414ae32d492a92d4d4d5d690dbfedbc6f1043f49ae3c4a8b43d3a056e2ddaa37186509244d62b9036f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4a77d3f8d98844e1dfabb4a031fb2f3e

      SHA1

      f8f0d201c041cbdf659a7a307f51efeb6ad445f5

      SHA256

      3ed39d01ae0e587fb850d195bc8c587b5d5d37d0e2689943984bdb48fa5354c2

      SHA512

      4f4bdc955dd130ecca871778f1259ba19bf9bb7d7f86a33f1fb6902c23be7dfbff2274f990c847d479ccbd14fc99506dfb66e52a77abc873073d2caae7003ef9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      20af099e689b36a8563c65886148f313

      SHA1

      1647c677214f8ae1ff17baf15bbb75489ff83165

      SHA256

      c8399c9f7fbf676fd7b8a060bbbb39050cb1760b9f64984fca3373b9917a5d2f

      SHA512

      ac70cba8f48710893f8afc6a093b185b2680289c8830ac5eb74216fe3d3d4651a2f4fa30de5b47c2481276ab213152c7911b678d9bf03c07bfffc9d831d720bd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9127eedb82f28c0aeb6e398f740218d8

      SHA1

      587590cb73b4313b3c6a9ab556be1ed06cfd8248

      SHA256

      f0bbf69cf2eddeaae209527d9905bb9462a989fed8e25dd4a289df4be2ce1bc5

      SHA512

      77b234519553b8989f23e2c4fcb6e1eddcd5dae623675e9abf876ce8b2099a4f2b7d786304888ff3e464f1c6ad8de521dd844ee5028dcb3caa2b51e24a340850

    • C:\Users\Admin\AppData\Local\Temp\CabD0D.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarDCF.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/876-492-0x0000000000250000-0x0000000000251000-memory.dmp
      Filesize

      4KB

    • memory/876-494-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/876-490-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1516-483-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1516-482-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1516-484-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB