Analysis

  • max time kernel
    133s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2024, 15:51

General

  • Target

    185adbea9de9e05e497ef72cfd9fa9ac_JaffaCakes118.html

  • Size

    163KB

  • MD5

    185adbea9de9e05e497ef72cfd9fa9ac

  • SHA1

    3fd4989aa9b46a98e78e10736db50ba38c4ccc69

  • SHA256

    d9c11ca2618ec98f57b38188630400e5c4a47f5a8b82ca4f5e8bef3dc7dcc3a8

  • SHA512

    95981f6dc8dbc2b27d63cde49a1f6bc9c51e1e015006aefac526f684f41125dd23c5478a2222baffc0b5b2762719098165ccb145d4d784ecdeb48771fffead44

  • SSDEEP

    1536:iYRTFZ1mSDDFGVVKEDyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:iS7BGyEDyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\185adbea9de9e05e497ef72cfd9fa9ac_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1940
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          PID:2700
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1588
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:603143 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b72ebc7029f90c2535eeb06df22117f9

      SHA1

      9c6094591efbcbdfe91067c3677b3c23ea9c84fc

      SHA256

      f6f46fb05bcf447485a8af676d3bf718787c639c9a88c58e6ac36b167664cfe0

      SHA512

      76795832b7623a940b26d923b0f8fdb4b2c53e26db6fae76236e71b043911d0bb3d102f19aeec0a156273afd48a5a1a2a207b1900b7ed774e09722a72b5f01d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b3f4bb8eb9347e6f1a878db3a07718f6

      SHA1

      8773d40f788171491f1092435bf4df745ecc6f92

      SHA256

      9b54fb8e0d8f2b6075dbc676ed55b5a06a33f6c6223a179819c950c23f431b8b

      SHA512

      228c02bd4e93713dfe7963ebc0aaddddbf437e85c701fdee0bdb2621ee34bde8d1a900efb28c2e645d574fa67c7ce75ad489ca6149ad37fa9b06d6655b1e4169

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bfd226d3da109b899671c9226a4a294e

      SHA1

      43052d0d27964458b48c95dbbda80f0477099bfd

      SHA256

      e0cf7a549164f2b8a19571983f5991c715a07d583b9eb7ec3c8df481bff63d8a

      SHA512

      1c701068335f776277e5294764ca3bffe427feded2a9d4e722a1e6564b15c30bd68b18074045f4bc9a83a7466fb18ce4dcc87cbe4dfc8c427feed0db3876c52e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      068036c6780f07c6f49eaa97a8ea18cd

      SHA1

      7e715c0ea9818814ed74a9b9b4daee63eedab20a

      SHA256

      fb5df1fabcbb10a43bb1b156a128bb42d555d6f7ae25d6b7b396d1b6baa26be1

      SHA512

      e23738f3a27f7b3a9616396f09cbcf8c970b69da47e2dd7cb0343640c91e9b31c47b1bfa3271f2a17e12fc83fe4667a89aec4998e090b40b65a2cc66394c79cb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      206e8ff69db34f12f004c37075a457ac

      SHA1

      48d5ecd5b27087f939ed47601cbd0bbeca985538

      SHA256

      2d3170193fb4b05c70e2ed797ce5499543426d5e1eee315c15287bdd8ff32801

      SHA512

      5db1d8022c74d590ffddcd25026995e3f0d36186e31fa91835d600b1db819a082739c69ecd0b96bf89268507210c8fee5a2a928c6caf62ab16ab6096f3360cac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      488c2d8e91cf862949cbc398f7cc23ed

      SHA1

      a67d50d16f4b16c13db73a9cc18f59eaefb84f9f

      SHA256

      ac5d79e6e7f0ca907157f4b30b93e84c921d1d673b12e2380fb10a24a77e656b

      SHA512

      922ec31455a4f141233657ff6950efd24df29df22c6abc7ad33efa5e85310a1a295c26ecc355eed024aaf5038eba2793effe8d14205f3f12d4c538f912d36b6c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e9bb426843dabc8895b7bb7a8e111a5d

      SHA1

      0d2e7ce960ee27bdcc1c10759ae49f7eb6960f65

      SHA256

      0afa1946b139c9a102a808aa6bff6b6c0641f827ee7cf70a1e302b1bff349d6d

      SHA512

      7da1fb9e8c3fab602231ffa29740214e0399b249158d5929d01895cde5645521a5706863c18bcac63d2c8be6c7e10c8b0e898e8a10e680026b507be5299df4d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      80f4c4158316a8d9f4c1f6cdada912d9

      SHA1

      7ce59657c27f076d0955e50f43a8fc01080a7da0

      SHA256

      d795a2567da1562cdf3cfcf359147807278109945001fe166e5f90cbe526bed6

      SHA512

      2969ac412ab7954dd6b6c5213a29e6d7bb28771c9026f990af0072c8c2a85fd08587c7c9025cbc594f6660a468e61d8843eb14c1b93d6694667cf7a39c87b75d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      df05111b498835e2e950486259bbf533

      SHA1

      17587eafbad95cf2969dd36d4ebcad06db86741d

      SHA256

      7b8325a7ba68a39cf32ff2245d762488767db931bec1f83ec2da97bdc81b5be1

      SHA512

      9b900ff8146a721e7112ca33cc05f8965929fe822bd3d8dcf1134f11e90f5fb2eb0fd0377fce41a8f4e0d25f62ea5e950fae1da834a574718a04ab881ad1d762

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6adb54cf693f50373f5dfd1f55ffe4fb

      SHA1

      c441d2926dab01ec92551de565b7e64618a66201

      SHA256

      fa1a2482a89eb16ab10f6d5632ac2ca759cc664cd47691171637058280cc6f5f

      SHA512

      351181a7e95d5ea3d69b3e60ff971019a09123d9ab40fd53c4e03a7c7afc110accad88adb96a8d5205cb05cd13b64ebbdcf7bbac664197e7e9acffe991012ae8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      489b97193d9076ba7c935d79d3327a46

      SHA1

      55f0b614363b651d8f6cc5df84e310365cf91c94

      SHA256

      97d366ddafa97af3cc19d8ac0be52a08e318d40a83b68d4a321dc204896f8086

      SHA512

      0bed6a37ddfc8bb15e11f985cc56931ffa92a0d9da229a0c119c01f2a54b4648120850cd044b9ef0d1a8748566b2c7199b777cb5e122feda6cb27c9160148da2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4a7ab1f5ea3e7574cbb1a44cffa12afc

      SHA1

      1ceb03ad210c5a222b44880d947aa427e11db417

      SHA256

      4a8985592897630b252125d32ead5f98c35539e747eaa316c08dc7277e382b2c

      SHA512

      96dbc66fe7ab99f0c2084e479f35c8602b6e5267c5c8fee3bd1add5e889c9c0efd5c3388fedb35f6f2b9284256f451c56458d180a5ee69ad9d0f299aa23bf872

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7fb79293421aa0b673691da67d80fb48

      SHA1

      0e848ebc76c35709036d85b629634688dcb1d5fc

      SHA256

      8b175af6d1c1fd776fb9cacb0e6be03bef791c501a6c2c8c006a3dd7e86b7b35

      SHA512

      c1ca90c0abd1b22f9c53a15de13abd7caa602eea028a1b06ab37f078759a5a8bd2bf175285c8aca5ada939ff43d45a36f9766c49f55ed2855bd7db2d79df46c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7cfa3a100fa3272008ee0eb5781d950f

      SHA1

      39ea11091b64a4aeaac57b2fc6785951a2fde8d1

      SHA256

      c33c4af563923a412d5be635426302bd90ba771f5d8e1a6b1bf8bfd0e17bbd09

      SHA512

      1733a1073309287f629c26374d71c0211482a3a6aa341cb6a80ef7f257da6c17a86ef4397a7fb51b3b34acb4a29b35a2a9ad879ba9744ccee5d7f4da47c426cc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      87cc54291542f98b5e04752099f24b26

      SHA1

      565b8063f1b6651c42e12ed57d7c6fa886d2ceff

      SHA256

      fe3ae479209a01d4a952ff5946ce41e9f965752bf96f2a29646ef92f646e014e

      SHA512

      fcb65865356ef53ffa84beb52a085a109dc299f8cbc532022d1f5b8ac44a54d0c63bd594192a83215a238fc1788de766c1c87072ec43a9041a036364fdd70ae4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      58f4c04b1413f667bb4a52fcafc1a3d0

      SHA1

      2eb2aab205b96d4a7ac045511c5e85e3ee139faa

      SHA256

      977b0cebf7875131c38eb7f82ec6b1169593cbbe8ccb62c2deefa1dd8732ddd2

      SHA512

      ad736b6ca2df762a59fb2cf7a1164d6923321f65b3022aca3f95f49c2198b0161a039e24b6933c5d446a5df84964667ab75929138651926f57db665dac758c11

    • C:\Users\Admin\AppData\Local\Temp\Cab78E9.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar7A67.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1940-491-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1940-481-0x00000000001C0000-0x00000000001CF000-memory.dmp

      Filesize

      60KB

    • memory/1940-483-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1940-480-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2700-494-0x00000000773C0000-0x00000000774BA000-memory.dmp

      Filesize

      1000KB

    • memory/2700-495-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2700-493-0x00000000772A0000-0x00000000773BF000-memory.dmp

      Filesize

      1.1MB

    • memory/2700-490-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB