Analysis

  • max time kernel
    120s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 18:26

General

  • Target

    05cfbf6bfd9deb04ab5334611c744f0a_JaffaCakes118.html

  • Size

    197KB

  • MD5

    05cfbf6bfd9deb04ab5334611c744f0a

  • SHA1

    7ee8473d3b39a7933cb5eb9ecfddb2f2b1b254b6

  • SHA256

    430f4e135221011263ad214446f79cc867591e910d6d3796c4234442c67a8c0a

  • SHA512

    f76fe216ef48986517afc094e672a8903cff58314ae325bafd7dc5cea7ecfcb686090aceb0cacbdc0c53e9f2f2313dd600a1870ef343fcc248f4cb34274fd2d5

  • SSDEEP

    3072:Sk0gyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFis:StdsMYod+X3oI+Yn86/U9jFis

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05cfbf6bfd9deb04ab5334611c744f0a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2656
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:472073 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2560

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      df1f85aff22a129813e7ed8130c56572

      SHA1

      53ba5621af247793b1064070c701c443c13519b8

      SHA256

      b1d8c88924e9526704cf7a09f8fc1ffff7a7c1e2a786c4af0f8ea31b5aafa546

      SHA512

      1ac64eb27986d280c241fdb97aae32bb72fe6fa68de11428de1bc6cd16fc3e9539c8b6a0ea085bbf6812fe76319a3834b52c31f2b5a56c8c2a4a05e7879a22f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6affb88760ccefde935e1f6771b8d240

      SHA1

      f33554b3c2c3cdf8b591dee7f8dc27560cd3e819

      SHA256

      cf2b8a7683439fd61f30e9affc39cc695294dbaf3c23fdb331b4413f00b81513

      SHA512

      d5e18fa38af70ba2ae0fc76829887be5615bd64785385e35c2a978b13cf80786c0fb0e41da8c1d3e56c2b1da03aed95e2f411450f08b2b1d51ce10d92fc40429

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      70d2931938fae62cb89c8c9aeab881a5

      SHA1

      c2297e40d47b2fc8a08ea47efc1fa551e8e1b75d

      SHA256

      dcbbe9342cb516f9b29bf8aa9f7a7df950bd30c8199baa78ecd2ea15e9e15ebe

      SHA512

      068e6f5c91601491fe78c11980ea424b5527a708a47821fbcdeeda7fd8db5fc2dd999d238f59ad862c6babbf72c4d459f56bcb2c0e543b633e2270387421b1ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c8d1370de1fa1299c0b226f63bd8b0c4

      SHA1

      2ad81d00ef5dd69400de3da228d09ae388978cdf

      SHA256

      b3fbed2dffb7770e9df992308a3ddf8e109ee9a5857dce572b2920595bfac530

      SHA512

      32aa2a7d95476cc39481879bfcf785caee953c1f1923e193a62c45b5d3164341eac33b5e4132855f8feee302df6b80469f6815d15a32294f92f799b14ce85dbd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bd081a9607e68f08adc08fa2fb3eb9d4

      SHA1

      78682449834e93576ee542f442374aebbd076e27

      SHA256

      8ec3e5999ab060d1a80d58d81c488ec8f53b98a6054121cad4b5c4c3d317c91f

      SHA512

      cca3ff42af84b0932a03e3715e62200a70b129d0ddaaf63f800bb473000eac93a0d783bfe32540916a4b19ff6d99516daffd3cef7954e36da8650587cbd18f02

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      da86098485e94c5448861e042aa2310f

      SHA1

      043bb66565625430ed36371e675d68a41e6e63f6

      SHA256

      75cbba22043172b1447d96904a2191cc154213e2715def061e98c59feba1d48f

      SHA512

      38301fe8d157514c9d37abadc8d79390a77144c7849c46ef8d5dd495dfb093e0f487040f5043e6bd6a990909aea8ede9e568e6335338e0a526b7ebaca2e941f9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d1a7a6efaff69cda7f68844ca45ef644

      SHA1

      688397066c3d67a3975408874e251bf3b4e8e253

      SHA256

      0b70259c93cae34258180c463174ada23aed28b5d2aae0e3a77fd82873af16a0

      SHA512

      62264b9ef07d0adfc6e0f5b6c9c61dcda24adac433041a84626dd5e17a22e15c1766d18e7552aeb4861b1acfba50f1dc5c7a4a4c51e3cf9386cecd41979cba73

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0c5c1952e4f4b85ac150b463cf60db30

      SHA1

      1eac76c7c856d7260b12e3bde5709a3a19978c70

      SHA256

      7d934397973e840f8d0c10125403709c327317ea8461f55b8a05b0930c39b669

      SHA512

      6d8fed270b45e8ec7eba32f882e650a12f403392914783ed523795859dd767368ea825d94e0443aafa4566f6fb22b2b069c889676425e2dd955e25577cc478df

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      11345f1f10a14d90c8bebf6ce5d4aa46

      SHA1

      260dc611b104bc5a0e61824a215092115154ccc5

      SHA256

      1b948f81be8c268a77f5e99b4863ef00283e77f7bff42f3940a92e7c47ad17c3

      SHA512

      95af16415e5ee6b11b6d228ae527016b102a509023871c07ee210b06aa4ec9b46af70bb71ff81562331c803fb663a19b8ce721639eb72f9372b979126e77dc46

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0fbf62c274888ddc3b365a4e7c4b3f22

      SHA1

      b7c1259691487da4b633234c5c435c30f95b0b41

      SHA256

      87cf6a41c3230235b04c41a6b67d63ea4fcfb83799258cf9b2e98e41d58993f3

      SHA512

      018028b4f488e4fe85b467c60bf54cc3cc7315449e155ac95516bcda5e94fbc02ed3d5b3c4212e9dc9d30b76636798671bf34de2602a55764ebff4f8e86ed3b8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3e0cef95245ec91c21685ba286f77bfa

      SHA1

      03029f50e7c0f10d8c7458252335c28a141089c7

      SHA256

      788391805e663a44835676c94b1447767b44cd4a6b29fc6c873e65c965f4108b

      SHA512

      85d0e414108d21f836f8e2371457e22b014c300343cdb8fad7eb42d4a058b19d18b058add9f5e051f75e715ba269f8f2176936300d2c0636c12d5470fdcea79b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      41c8076dff715104d0299f64c7c2135a

      SHA1

      463d51fb4f4148c0e6ad15446a48262d2f3773e2

      SHA256

      22831b0cc093aec1e7c034057d3ecf187ef573a67ef7cc802b5240e57ea28972

      SHA512

      1eceea3fa536d2981df6264dbcf8dc73f931193c11cbfdbb35d594171da69d02566584ddb4ed87ae8b696a187331a7dc91cc2e6f9a9e1973883ab0f861f59803

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1960baf89e64b6867df439f4cb479c75

      SHA1

      850b8d483b8c00470e9feb29c0d5fb180db577b4

      SHA256

      a65b36cd925fffaae89e593e64df4190f614046ffbacfba907c64b84ee8c4e05

      SHA512

      ed36b310ddab79f3c2a33e3918f6f9434d92b437c39691b43be9db31c3f61ecbbe9d32650c8f41ba1fa0fd96fa5cb0c19333b14181bedd2ecabc73f35d19cd67

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3b2180bbaefc16d409b77b7aa8e0ae7d

      SHA1

      7b3a1e12eb2c9bd4ed745b1aa41fe0b27a8d61a3

      SHA256

      c9ef6965717f6e00ef3feb650e26daf1f3e75c5c5b858fe555f0451829145353

      SHA512

      703f649ab3a3420615cf72bcfa5c5e33f159f1c08cdde01b59715d244436d8e39a66e6adc5416918833bcce66d25e51d42d7a91a00dbea76a3d2c01b0fbc35e1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      10b498a450f56e521bc89f2079368133

      SHA1

      711ceb485e54bed40881114e3d6b6092a3e9fba3

      SHA256

      06ee03a8be9e26bcb84b68d36c4041d0dd989c0b6865cd39f64fbce1dc714636

      SHA512

      8710550c7dac8faf1e19d574441cb9466e94958e508d1356267c8c5ca7447d6be4b8b4386b299f7f9a0c23bb54dc00b812e4367303b53a07fa3e02a4dadeb8ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2784892719db486576742d693fad78c0

      SHA1

      8d5e5989da6a2abf44dc3c7043d14552e37fe956

      SHA256

      522d419b5c8561fbdb27f53407ab82e1dbe365a0f6ebdb06a922e866050856b6

      SHA512

      2f65cdef74a2c4b6872738679f7f99ab63f34e1ad1acff913954096899fedeb993b7a4bee54518fc46295130f83c81d81484fe4123350f9f24c55ed74508a9c3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d7a1bd15d5ceb3c6d3a98b17da27602b

      SHA1

      3046513496ea794d72ab314bed3c7ea2457befe2

      SHA256

      63ae5324dd43189acbeba8ed129c2897d8d943c38e54aaee048c9fb8735a73ce

      SHA512

      dd4a37c6e6ff6cd42643b71b188b43900a87a3e1374182c2e42f23a2c4a960bac4b7572b28acf09d5091e162a24db0752b89f48212f38fe544fc71902b0819c6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7cb86247f9aa5a219d534b4003e2fbae

      SHA1

      355c43c07b205193858b929e4fbb743153959355

      SHA256

      5400d45bd91c636613fe82378a51f256ba719f5044af4ae95fdda856f8260ff1

      SHA512

      aa94d388fb15e41032a6077096f89430903f5e26a3dbeb198ee3f401498a37b016ddbaf4cb88a67f29ec6efb071d6cdc3761425e1109a00104fdb2a0ce623290

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      961e15055828716f5860af36bb770f94

      SHA1

      c4f10ca51ba65bd5171ff553874fb85fdf31f6e4

      SHA256

      ed44abe7f32635fef06efa8f3783c55b7f6f3c85f45ea6aed16672cbfd287312

      SHA512

      b2245051bd06414cb18f6b74d92a9778131e4bfbb021351a2accfcc98429f0333be0232d5e3ea0b1a419be84204055e657547934cda2a40bf81f6d7de4043142

    • C:\Users\Admin\AppData\Local\Temp\CabF26B.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\CabF378.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\TarF3FA.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      83KB

      MD5

      c5c99988728c550282ae76270b649ea1

      SHA1

      113e8ff0910f393a41d5e63d43ec3653984c63d6

      SHA256

      d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

      SHA512

      66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

    • memory/2668-9-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2668-6-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2668-8-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2992-20-0x0000000076F5F000-0x0000000076F60000-memory.dmp
      Filesize

      4KB

    • memory/2992-19-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/2992-18-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2992-17-0x00000000001C0000-0x00000000001CF000-memory.dmp
      Filesize

      60KB