Analysis

  • max time kernel
    129s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 20:35

General

  • Target

    14615b5e2d75fec1a90a1be90c599961_JaffaCakes118.html

  • Size

    155KB

  • MD5

    14615b5e2d75fec1a90a1be90c599961

  • SHA1

    fec8cf1223e88a28a1b3af50d33a25cda3e2ee3f

  • SHA256

    a33724a91432ab19c35dbad35ac0bdac2382626bd039938c86d337544ee415bb

  • SHA512

    22f15321682d86e51d1839b4957f8a587621748f8f2834e5a56d8499c0892e99a0a9c4a1da4525f954f9005aeefa3d8cfa5ed8fd81f05dbc2692808230266f20

  • SSDEEP

    1536:ieRT/GZN+RagJP7CXb6+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:iUSbghB+yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14615b5e2d75fec1a90a1be90c599961_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1792
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2824
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275477 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        PID:2096

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7ac6f7f0505dc4d6f084385319f6e6a0

      SHA1

      32b1e59c19b1c6fbb4886ee241bff0501010556a

      SHA256

      619760e88db5606a6d14cc8b8926495d3482396caac9897135e283f9a8d733fe

      SHA512

      d9458aa04d5817502858f73e8cd83df8fe47f81a6d86419b930614abf02e892be344c42dbc24e9042066c791253d6759b83fec40dea1d9494ed2cc189c940f4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      48265e4cf3bf8384d3370aa263f6e5b9

      SHA1

      e470687b03f0283831cd2d264bbb3ee300413cd7

      SHA256

      babf3f7cf4a9d1dbd9750db80c8719cf7975db16f8d2067c2d580886e144fac9

      SHA512

      e4792ed17c0a431abd2e6e0eaba4340b1f0102bc3293facac6b7e1c55e128361738268a87ea3e2e0075ab9957b081d5a57d5cbe724949248f2028bd91eba1266

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a5ab21bc08f55c5631fa138125df2869

      SHA1

      d61decfa05a56501a25b44b516106220f50dc397

      SHA256

      7b1c139a051bcde6143822810fc4c682f7326e5fb8409c444a70a0c1c1698741

      SHA512

      54a6a2e92dc0f1124187c0ae4ee0f21ca1775eba1e9c102120e00d9642fc4f7f79e2e19b5d40493ebd636df44b9f2f71c62b66102bb9b256de84a49e1282bb69

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      49a8cfe20112c42ca8dd04e9eb92cee2

      SHA1

      3cacbcc96e8ceb14358b591bb2f2b945d7b466fe

      SHA256

      870a921405e18d286490e5a4bd97dd10707bc7a1a66447e7b99eed02a56fa0a9

      SHA512

      5848a79dc04345d7027508d84548cd23408956eb564c0ad99eb2599055a64a0b0b792df08e359af5ab5789e400c816b3763b595c238d826a242b7e507dcf84e2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8976adc171279962f35218aeb01335d9

      SHA1

      d5a6d68a7c96c0cd127d95b282d5749c764fd63d

      SHA256

      55e66ef83a55f0a869f8792954ea464d787bb20f94ba1cf38500ee425383d403

      SHA512

      ac838e30f066bfb1bb4f561c5bafbe9bf1f1da73b9cfb34bd412529a5733a296ea2b1fb4f6ca19ddb9fcf6534548dd2ea3909c37969c9846a1c61efa9e138578

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0bb2e34bd0ffa59991ad2c0c741a2f8f

      SHA1

      932255fae13eebd4e57384a848092e55bffeae5a

      SHA256

      f93f4f51723cfb88e0286c55ed410732d61c076c2bedc11f34ecf29884e261d2

      SHA512

      0d11407ef45dee0ec0f856035268ea892bf381ead07c8071d7e04a75cd534bd375bc2341616f36e0887da7d6446a55d13864996cbbe4e60aafcc127a45ad9c83

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      88ca7d5b18cc613089ebe691c4446ead

      SHA1

      cbdaf34f481df4f8f3a5855bff06ae96e2cb0994

      SHA256

      4d61a0071196d2498c944b7cf0a733d460d5aa7519858109305e995ea21282e1

      SHA512

      5dfbfef39c18e6b27a7c808769eb46dcd2febf27e1e1139c882070afe8fad7f09b9debb6a0ac94d5143e001359f5527aabc5ee7f17b31a506c544c944f246c6a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      de4475a6818e30e977439e0926d6a84c

      SHA1

      ad42147c96710c1c61ef39984d724387a33d9f02

      SHA256

      7a3757de15b554103efd14d681ec7a6582aab815475e7e83aedfce497b7868ca

      SHA512

      2e795a9461f4cc317014cd7ead2f581ab7ec4503759e4fdbea973afbef6e7aa30acadccf9ac4b1d908b3945e536ae9b657d545f7cd4d23175f678cdbc250efa6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f79907c518b081bdc99c6b6c6024865c

      SHA1

      6501f7422ce4707a53a514f33b1dfbc022cbf61c

      SHA256

      cd9cbc71a53e42e20622bf4ad46f5a9b43525069973186f49c046db3d9345369

      SHA512

      a8a5933e4cbee6b2bc71ba3040dbb69c806d677674bc14b0f807549fe6f5325a224254ee97f5856d025fcec5b336d53014bbf6d0607bb85cd1a1c56147debe0e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d2e6ae32efece16180c760be64d8e86b

      SHA1

      8c93724cdc47ea676616ff4ca63dc9e6c8d5ecbb

      SHA256

      f798c918c5f3368d9ec4caf756c0c3f63dcdb5d9778e0787b2b2453a27ce8cd8

      SHA512

      59014108586ace364e8cf0cc087425bf2b1df398d92a2765005e97129893f63fb91523682502240a8e5682e728b01d907bba1d58ab5c2c13c4924557a6bedfe3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d7fdde883e2bf94ebbee120de3708e41

      SHA1

      5c83a1febcc02972cd6bf6348bb8c777977f95e1

      SHA256

      a9798aa14dd02d66d6655f619491404c4a1a7d8f6929681605804e9651070b64

      SHA512

      fcef607c1cee6895fddf59de0a503918557bfbea77da080086fd6d732691c36f884f9c1e49add8c7c60fac05d995f94492c08bc1f5c3c218625abb6a8040e173

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      664cef5916e6e31dd0b0fd4669c0c505

      SHA1

      7a4ea954c34b10e03f23699799faa92096d61aca

      SHA256

      cb67530472a64155be72854ef79d466e50eb5e2628283079b70bb130ea422174

      SHA512

      15b6bc509145a60408f17ffd0c1cb09310d941748f7ec2e5a8e432f92817d3814fcad97184fcd270084eab43d696cd7a75f299b9ed68a1d4504b8945f20d87d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ec788ab0d47b62dc0d703691bc03ab58

      SHA1

      94287d6b4c3feeb7cccf5866848e573731626f98

      SHA256

      b39bb66a8e1eb2939858ce58fd860b7c2db9dddce04d974b477cfb332d2cfeb2

      SHA512

      879aaa9e4693e0027ca104c6a392aca7acf9281f51c74f519e44e310113492e0fd85a337e6ac9d069ef3e086bf4c4b2bf21cca471d19556cd000dbb1578a551b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5b051db78b83f21de5e95110c83908c4

      SHA1

      519e59eca1aeab1bb7347ec17cc6f306b74c70c0

      SHA256

      140a920e052b0142a4d85b233a53aba4ceff9167c2e39e7509eb26f0f1971bdf

      SHA512

      51c039aac4199caa7c071dbbb2f175aa454f0db8a8f8c64e856bd78f6c5735c00dd8cc4e3cb36fbdc4a7f26ba458034fc91f4ecf4ab5911a42bf9603addcf90d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      467546fb7bdec7481d9f6ec4e44a2140

      SHA1

      425a5ea9c7bc696faccd78bab7f147f4faf329e2

      SHA256

      2b64934b5f230d31bbec6dd14289a1ca99622eef2c51bd6a6169efc751d43fb0

      SHA512

      33b4b8ef598c811248e192e23a810d4910f8f2ebfd239a787a1a43b1341abb9e364a132aea858face7bbf381e202cf56a9a19b47b67b58a93bf4db5516e88043

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ff748717a094423a8a58cedf7cacaba3

      SHA1

      1fe4d0c847b24012c0a60cde17638a257bf4960b

      SHA256

      cb4944ea21b2dc3d8f35131d5352fabc4136d736e2ff6f15deea57b0478bf584

      SHA512

      bad3cf06c17109d4dc583295eb665a06c24ccb89246d342631ce7d083149bc0799413bdfbd746ba5a668ee2a6080f94cd2c7703c6e2c811743ece4e761669a15

    • C:\Users\Admin\AppData\Local\Temp\Cab1CA7.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Cab1D64.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar1D69.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1792-490-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1792-494-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1792-492-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/2192-482-0x00000000001C0000-0x00000000001CF000-memory.dmp

      Filesize

      60KB

    • memory/2192-484-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2192-480-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB