Analysis

  • max time kernel
    137s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 10:23

General

  • Target

    0b8c8bc1ea0abe83bef6621b0a17014e_JaffaCakes118.html

  • Size

    156KB

  • MD5

    0b8c8bc1ea0abe83bef6621b0a17014e

  • SHA1

    6e403cbb864e42a0fe550d98f61af23098d9c8ea

  • SHA256

    a338832a34a2bff92476c87949c56689340ceb37ce9fbe0e3bb0beb4db432603

  • SHA512

    befa913ffd0f9f1996882cf8b45ebf071ed57cd18765029665fdbebadf6f67bf534973f7c83d4f2e81905627df38319f8da977563acbab2cce59b4508d3ad1aa

  • SSDEEP

    3072:inQ8S9F+tWyfkMY+BES09JXAnyrZalI+YQ:ihmqTsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b8c8bc1ea0abe83bef6621b0a17014e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:332
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1124
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1324
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:209940 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9d9a123c413fa25cff99037d93c10354

      SHA1

      688e657c98a20489029a863fef1eb7f4b7c03e5a

      SHA256

      ba7c743b34130037a343b1f81c263e87801cd013aea1cda01d038c7e0e7c82df

      SHA512

      cae808f67cae483aed9b3b7ecc3c516a90de1d3cf42f082300d0b50c47360979211fc459ac97b8b3bfeb9f688016ffe4fdb627514367507f5af55dc211591499

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cc4ae4e5192d6146e4d5fe772708c7ed

      SHA1

      e2918d91b0ec8863ffca8c581e42fdab4b0b0337

      SHA256

      23046411b0b038957e864765859aab904c2188a3884f4165a98e1aaadfb7cd44

      SHA512

      cb60e38d3e72b4704c900cae4c8761b6fca6d5a07254cec52ef05dc34b567f527f09ece12c86d476f355c7b4bbe6b8ced0449a2c974b475593545409b4441638

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1253f7c0aa853aa2b98ce78cc040f8f7

      SHA1

      818bacc4b3660118af700aa09d9db6a088dba9b2

      SHA256

      a28be9b7c5310bc4aeb0942233dffe2a676c746fb29a13d0791cf004df9d6fc8

      SHA512

      987ecfb3f1120a81e556407b8e0f015031a568ed2fb477c4128f3a8e9822eea3e65b3e7a70fb3ad8eda80bee39c701cba3ff996d66877490eaeedb407193d3fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9fd959a290a3ceb27df37a00913f434a

      SHA1

      6a1d67afdd65c902f6fe7bb1b323bbc2697d4e2c

      SHA256

      895ef77d2551665924132ccb03f4a356b1062cbcc523db5b683872f4825df568

      SHA512

      e50fc0390245e832c1c7c36c165e664d96a752111a19666a69ab9ba386f577f85750f8dfd3d6cdb4eac4fdf86e5b7763bb1bcb1abb383195795f667476449d3d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d99a1d73301fbf94f75a7c483f7bf39d

      SHA1

      8c3ceec140b6168b01cc56c85a0ff36c0e2e4a07

      SHA256

      f328a222844fe98fee6a04e7151d0f90631d3e7890f136d86e3072260cb355b4

      SHA512

      c0cb2b6d3e0a28e5d9e070f3ec51de299a22418b3525811253d10157c1a1c4bf35614df637c209a9ad76a790444ef80306809850978f56750a7f8048813e2c51

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8cfd96b6b3d6b236bca1432bd159e0ef

      SHA1

      bf251931c0dfc5d5263a6a5c4c9587b4455036f2

      SHA256

      b17653632706343c1e1007bfb37ed84385e1a811e18d66b9ea852040e0ad5c9e

      SHA512

      642460cdc52f91a923d8400e9f1dd58b0eba925b5dcaba7234200bfd940a20ccc312344b157a8ccd1eccf33a4b9eedabfbeab9066a346c4048c2e0d1c4ef76f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b905c7f49c2bb75c838ea1039a7eea7f

      SHA1

      221afc1bd89abe4acb6085171f77a3ce659670ee

      SHA256

      6d8fa54c47f107a9bf403d6c2b462d2f87ba8b842036a9267cbdf59ec3dc55ab

      SHA512

      c923cb87c10f14a0d4650a0ff5ee3c9db6afe96b10beefd762665d43b8ec2897b64a67dc43216b241a43775500b6268a8b34f9a594ff969fb735a79b779affd4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cf186bd30872fa42406789611a6df5b9

      SHA1

      ef55da2ad7f01b61f28b9ae1257bbf561937319f

      SHA256

      a07ec3bbfe8e2837e0497bfc547ee01377f095c6f47f9aace53cad5b5e142b81

      SHA512

      b050e1fc902d1a29184655c19bdddf0bef02305e7b1aca0535d407a5fd5b7e098291ea91664054590bcd36f497ec7fdf456955eb3717ff274d4552c4110c9f9b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8d07c3dcb2cc14657bfac586c8003112

      SHA1

      d4e688c7ac5e8e3008dc2b4613a08c97a60aea2f

      SHA256

      988aa073ac8fbfcbf9bf3d03643aa98cf40f942449f72929c56cc79b7ebe19a9

      SHA512

      56f13efc70eff023a5972e5dee0fe26d7519e555f54a3a738f898df1472130d0745e494f38edb97dc955316bd043c980a92ec87117e10c3cc3b43aaa47d51fd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      60483008c09f110d188b5f328a3f813c

      SHA1

      c88f801df84b4950091662c73978873694d8bf22

      SHA256

      d606e85acacbbd332c439eaa97056a8b0396bc75cce89ffafacf595c9442ac08

      SHA512

      7f5666c2fd8550c9dfaa694ccd2be4290e123e8e6222dac1c109d7e2a1ff5479ad473029dc529ab2179ec2b9467ab20e83dec45594450a434260c64d40810f36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8de61a619af6a006276df174a1310b80

      SHA1

      92f009c627dea7c8ef0618bd0fb765d7983c34da

      SHA256

      6ef19d549aac2860b45e3cff15f31b745e2caacd61f4c012766f5c67c9c9341c

      SHA512

      3d51116e29a6e3764cfe0d1e6338e5a34c29906efd7af2a4e300ada1716e4d3e2610d581c0975e2d6315aa311fe86483c9fcd4718a5dbc279fc8857c61d1ccbd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ed81512078b56e28122ddfa1969770a5

      SHA1

      3d44a535b71fae3aa5d3645f80e51891c94faabe

      SHA256

      657986ffef145dd54e6b981308730a00a0c04774642b722ce99457b3fd274b39

      SHA512

      1c56002c7f264b3dcc4341be3588b27b6392399eae62dc7efdc84ba1b7a9753fa06f253eaf57fc178ca167826957cb6d73046d0c376d8382ecaec52eff0170ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a6d1d8153f51af2b12dde6ef9abb80f6

      SHA1

      107678c45ab2d0600ca7b36370b53938c31c29d1

      SHA256

      6cf6eb6504bc9794c028f8af47a5d68a8a09939f30e2cb2d3807bec2c083ab2b

      SHA512

      fb98aeb3171b8d4898fb96d7e3c9c5b40031b2d3fd55ea3701cc9bf32b25fef88fb37287d4af673ec601b587dabc8bfa1b47a77bfd77fcf2c12c108dec3b48cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9b24763f00e64a4c6e6d57ed1eac291f

      SHA1

      a915b38fa6bf013b7d9ed7d84b17ec0fcb9d0624

      SHA256

      19d5901da591aa5c04010cbe3dee9b7ce6970fab028d8ed7d2439a84a14a8822

      SHA512

      c887de6593ca49beb1e457f91da7439e3932cfe0f079a3182b3a448b1a024ba97e01ce5d0a49136daf5332a1775092c5296171876bf41d95af82bb6064cde32c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2b8343c63ae1cbc545fcfe1620d088f5

      SHA1

      72288da5fc8a122c9fb37703e70d9a0100ec2318

      SHA256

      575e7d1d1a2259acba77a01f43eca545e3658101d31b6807d677b2deb6e2153f

      SHA512

      9ce7618abb86c2bbdadcd012823ccfb001af6cd854ae89adce6185fcaa72bee4fab7df7945a9501bf1e867060ac2d5b1ccdcfc8fdb9a623c5a6ef27077cb070a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      54b43f767b0de0ceec31c6581e1b7674

      SHA1

      e83fa9a10eac542b84583becb29ebfa0fb43b5f3

      SHA256

      e3fc9208d3f7b9821728401f5dff2233265ce8c37ff896c6a3eedcdb90e50cae

      SHA512

      bbdebcd52b7bc95dab432d64ee75945e48eef8977187ec71198eb55708f116b6c6c9e866435a358b27e3cc052fb14ff93564383c24f1b718a0aae4f3aea7f5ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4e02c7e93dbe7886b541c666b30e2998

      SHA1

      6905687481abca6ab7ce5b3d2b04ba6bea934520

      SHA256

      6a823feed59890347d290d7cfd81219cf3c367c5a10547a9a7a58cbe6193471b

      SHA512

      4744880ed93ee817e85382025f37a1ac90264ce8ea653bdaa7c266e69b6ce015f42354c806be95fa73cc3fde4ee887c20a1c45ec33bd16f69802c33308e3dc7d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4babd848bd573f49cb755fcaf2ac03d0

      SHA1

      20df0b78cbb7bbfeb0405e5b241e8a1b2fdc1f42

      SHA256

      b64d1cf338b1959e8bd76adeac137ba4cf2339d9de95cf6e53f460ded4b880cd

      SHA512

      3f0a5bf0d8cc3abd3bcc160d3563474d4bd6f78b2e759c988ed639432d1b6e4f0bad869dd46075e63b294512a1220da7eb23f4b944931bd592265b0904ec55ef

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ab7207857e3fc20a43732749c321563a

      SHA1

      7e07a8675ef35a15a609eacdafa0d53f10e0c760

      SHA256

      c801e31f1a0ee21de3d40e942caaf01ef087375b588e68ae8f8ba29c80188e07

      SHA512

      9f40cf17bb44deb3df47f1f2bc37c04e4d1c93d924eb7ba1d2a62caeb808f5776bac8ab000467206410927bb9a49b6a37ea27031f8029fb49b1b583ed972fd70

    • C:\Users\Admin\AppData\Local\Temp\Cab1C68.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar1D3A.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/332-484-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/332-483-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/332-480-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1124-493-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1124-494-0x0000000077DBF000-0x0000000077DC0000-memory.dmp

      Filesize

      4KB

    • memory/1124-491-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1124-492-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB