Analysis

  • max time kernel
    130s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 20:00

General

  • Target

    144316d0c23ec9c5399c76c0518428af_JaffaCakes118.html

  • Size

    158KB

  • MD5

    144316d0c23ec9c5399c76c0518428af

  • SHA1

    337d9c75f8f6c1ba7dac7821f0f5e038b48f1aff

  • SHA256

    b7c7b7958e1ef863d25bcdf80cb50b4e50d23992aebd8136fb59eddba098cd77

  • SHA512

    5f314267b262498ce01086cefe3a2562c2e89fa0c8bad6bf2543378f2b1c408db9f5fd1d3835e14827c64855d04c6e1170469c850b72ecc84bfd757fd60f5138

  • SSDEEP

    1536:iGRTaO9G78Vc28kxyyyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:isi8KyyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\144316d0c23ec9c5399c76c0518428af_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2936
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1956
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:406540 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      237a02d7b2b02fb32d67d3d92c4dc890

      SHA1

      8b631ce3be64111e68422b5e80541790eee91b76

      SHA256

      eb3d2acbe1a9952221d5739a348c2c350116400d6b96439058991112c7b3e8f9

      SHA512

      eb3c84310990eaf66300af36eddddf30e05416a9e7f2396f66839fc3212f9f4c3757510ddb455ff168e713cb1164bbcccf09c60f656ef9923977b31576e92ae8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      952eb40a4c951119e8eb0824c42143b4

      SHA1

      f03c6c4d2bdab9b9919b19d6be51617bedc4d7a6

      SHA256

      d421d94e9adbd27a0caf18f76cb34928a5fff9e9d82fd413ab82c1bb39508121

      SHA512

      26b08c7ae9bdbffe4706913723b3a2c90b69a02fa9160827d96db1410f65f5c628deabe9262f5d2c7812f4348ce09da7911a40c7310ac92f2ac4f61f245b61fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0bee77f033ae6633bef639a1503205f6

      SHA1

      69b713beb2d6201dc843f97be6599ed9358acf25

      SHA256

      93d5ab017a4cb859c881f1c51c2cedc8e96b0c758cf6ee43ba230820ba247088

      SHA512

      13f54a3bb167ef0108df61aa85da544fcc9aa3219dd4ca95c6ecfb170025895042626b7e3c14367fd7da59266776f25726498fcf8410e5ca29a017673b4e2ad7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3fb3b1eca74ad89f8efd1b63f3bbdbaa

      SHA1

      8cb52168414efd52492172215a2a6247253c1ee5

      SHA256

      d4c6dba2923d1eaf84ad7bbb34f46bd7c68e7e32f2de663bf420b7cc61159f17

      SHA512

      d4f269ab10605f5f529114947f04dd5d5d2a8ebb8337469cff04db1c002e73783d87ad831a88cb333b35ddcaa7e2276310941d0661131bc10c86324405eef9ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9dd11b690b747ad3fc0a3cc8a963843f

      SHA1

      cea2ac5c8a1db976954ce161942607916d478373

      SHA256

      338497a1deb84230fbabbba724419a0c8db6b5ef4a55ee53127d22724dcd7fbe

      SHA512

      3961ca39b26ad313e8f8be993fc83effbbe28ea33774ee28666c7dd8e57fae1b25a6ae8ca954865f16da882de484259ec3343e1edbc809de33e7dd0cc45ae1ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e6c3ea3a06696fd3377c2b1f92d0ee64

      SHA1

      ad54c8ea0668d2a3d32dd5b9d3ee1cf658954938

      SHA256

      9f89fda54bbd42e7d6d325275f3142dfc1c227e8bff8babbe8935158912b753d

      SHA512

      9cfa921d1184d93d3d5ec09bbbbe7f7e24be724452b7047c29fb24d0e998bf193ba8603ae243a59b5f8b7939b183a2ab87904b482853361af350ca794f437374

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c2b0513e67aab48496fdc7a01bde922b

      SHA1

      d20edcc339edf7166c95025959e96e5c71589e75

      SHA256

      b71727a6262a479f27085b009179f4970f541f8371dbe78703cec17f6e361d1f

      SHA512

      af4bc912defa3fb55acd9bd496cd767381bd1193050c029f17995cd119316f3650a94beda6a37c55685c829d2b15d0f6c863c816181fb708d0fd13646d406c98

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1e17ebcd70ac532091de2556cc1f7a11

      SHA1

      22ece5e4609ba2e9dc7e3ad153d8bedf17a880f5

      SHA256

      296fbaab51d80f4f8beafc0dd67853937a4012f53efa8a8c9d2963c8e310156f

      SHA512

      0eac5c162348d79f86af780abb215e73ef0f6f57bc2898a3a67102544151566f6a1580a0e2d2ae3f37c57b7bcafd85008837de853e551cb252aad3b118a6d346

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      221bfeeb70d32720c7ac6b0845deb288

      SHA1

      40f99a6bcba7ac5bb00d74c92cf5c93c47656e58

      SHA256

      71d2ad1566ef9dc2c025280e1d588bcb20952963b1948b0dc2b7fb459be0094b

      SHA512

      92735af971305ad2a06b8858b16a93e65432191e7c8e9ac46f6db62a6a4d36578ca6af0dbf6676f3f656bfcc6efab2a7d5a0e7dbad447f6e8a2c112f1516e9f5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ed8d746b8899676dc6e2b394bc5ec0c4

      SHA1

      a5061ed5583e091651f9443961e328e5b62e7b12

      SHA256

      24dcf512aabe4ae5c7e6c802b7f7a5ed3b5fae9bb938a652324c77028b6dfc1f

      SHA512

      526e0715e4d9468073ce91a8f2e96ee9adfc1d069741a87480f2d2d3afc9a72bbe80bffcd27b48a7dd3b8ffb335641bb6e101bc7413abf1f5f9798b6228c5b31

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7a3e4374c4ff7e3afdc012bbab125a40

      SHA1

      7e3f58e5e6f68bcace3262c745b5144569549450

      SHA256

      c1992e9d122bd58b46551db72e6256eedda0ff5dd7923d9e983a7bb494707807

      SHA512

      aa6eb8ec3768a04de9bce8f60138e7dc328729aa03c07f8130ed19c5c6c5aa94ff6361cb31e5b021301a9b132dfd4e3a3b6a6de1fc129391096a685726b4a2e8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      775699ed92bfe998c859e672dbb4f493

      SHA1

      a1d5c556822a95592a265c1b83164ab3441882fd

      SHA256

      2119f122b515d2e4ac07a23b94621f9597d166c57d83cf75f5eab9dedf670346

      SHA512

      37ac900a78f92ba910e78086ce6c5a54e17f6b647a6cd0873b3b5b446ce8e7d945718f5c60ca7b144797a0e154f49af4a5a8ec27b7bc9742cc63cce84f625b1b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      946f3b8510b72c483f295ef87206e195

      SHA1

      0ab03576bb1ed174bfec478cc2745bba05edda00

      SHA256

      6001e5efcf8b20b103a9ad65da5cffad3cc86689e9b3e98ccc3cf6e09bf8dc3a

      SHA512

      61a3237450fa8427780def450d22d2103ca58a90731aa1abdf137a7617f242f15cf75e7d56dc7dda8fddc9784679cc229f90ed2f48a33536a057e6d04ac9a05f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3a797a0494a8a101a39d401ff8c993af

      SHA1

      0402f05fd09210bfa818ce8a82e74e96e061f2c6

      SHA256

      fa7a5e081dac2c4325d6512ce8133da8e198df93276f45a88844ae6dab80d713

      SHA512

      0fdc073cbea65439b91862e1a009c6db68a22d033fb287de2a22e46d885cd51d3bac249a27d3741bae6e980ed55a9cabacfc3120058050bb67c997d904d178a3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      da2ff3daa9aec74908e539587bf1ed5b

      SHA1

      1f59ed082ff98722618b2aeea9496b71d1efc023

      SHA256

      685967534458cd95b9e3e906c3ab650211ca355c04de5fe1a513b649a197542e

      SHA512

      7b454f429fe6e4df9f3438f25b0dc9e1fc51b361259f686c68ca360b8e82853e103b41eb0b06c0f7ff4125294d02de0e04ce5d1cb9168f30b6bd38383512fc30

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      de2f3473cceffcb86ff931e75e315075

      SHA1

      020bdd35bed9125a8cf80e38cd8d3c2125578a58

      SHA256

      336bf113cb1668f42409394698a361170a9b8a578f39492a0e35e5c21edc89c5

      SHA512

      f3d8a42c5123a737543ded0687d3111aed9971e6cfe39b4dbbaecda1c521d87e4fa26a30a2917fe13145d8d89bdbb30f00e4f4329b0be8b5d701cbfc5c5f7984

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      582533b26600eddf77967d3dc2949a2c

      SHA1

      5c6ada2a0c3a1eb0d4a3ba6fe1745347014c5f93

      SHA256

      36d493dcc2eb7e85727abc5a2656c6505e1efc6963f67cefa36b4e8db7ca23ce

      SHA512

      6b0d5625cba4c8bd8c1aa4fd21946dbc4b8efd702576a7840c38c7c2f816187329450cab53e6dba877d354e8b04a31021d896621d0c2016e1b4b669c921ef25f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9a486675d4c43100001bbc5deef62035

      SHA1

      fb8ef2be9fe46881e97b47132d71b1be4edac6d6

      SHA256

      18c7c489561ccf303378f13b64ab7b8ee1b1d8517ecd38346fc309a3e275d309

      SHA512

      5cc7a7282f82f70acbce3a53d813b9d97ae5ea1bc90a557d2f9be2c3cd0a140f3bbbaadc357bc2a5073d4c2243cd851e391efcbe2ad626d0cf7b0625ad2cf5d0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      18132f105ed082ceeec323cee6507748

      SHA1

      aa342ba3683eb278884de062fb5b315b5043e287

      SHA256

      f384955fb2cff915df21480009354cd1c17b6f463a93b005298032e55d541eb7

      SHA512

      c0e13981ee6e3708f7800c630816bad03eef12f34ae6b17aab127c98f7f49216d434c3a2ae15d181ae6a1b88a3d88992cd75c35c989da0dd9deffaf2b67320ed

    • C:\Users\Admin\AppData\Local\Temp\Cab11ED.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar130D.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1716-481-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1716-482-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2936-492-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2936-490-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB