Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 20:04

General

  • Target

    2185e715fbc49ab3cb2e44cf4abbda36_JaffaCakes118.html

  • Size

    530KB

  • MD5

    2185e715fbc49ab3cb2e44cf4abbda36

  • SHA1

    9a5a1cfecfe755a82bc30654f0b301c03d971d90

  • SHA256

    9a883b3998701ffe89ce58d06a3e4a0dc4cdb146546fc5ec64dcc3020d308ab0

  • SHA512

    4aa492b0e2860e007642983bb2f503f750b788bc1e8177c2ab9eeb3ca5fa79fcb81c4455ecca3f837a6da71539b8621a08f87b57aa7319e0896a2ce63f09bca0

  • SSDEEP

    6144:S5sMYod+X3oI+Y7meFekr7sMYod+X3oI+Y7meFeklsMYod+X3oI+Y7meFekw:g5d+X30ef5d+X30el5d+X30eE

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\csrss.exe
    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
    1⤵
      PID:396
    • C:\Windows\system32\wininit.exe
      wininit.exe
      1⤵
        PID:388
        • C:\Windows\system32\services.exe
          C:\Windows\system32\services.exe
          2⤵
            PID:480
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k DcomLaunch
              3⤵
                PID:620
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                  4⤵
                    PID:1608
                  • C:\Windows\system32\wbem\wmiprvse.exe
                    C:\Windows\system32\wbem\wmiprvse.exe -Embedding
                    4⤵
                      PID:1800
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k RPCSS
                    3⤵
                      PID:696
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                      3⤵
                        PID:780
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                        3⤵
                          PID:828
                          • C:\Windows\system32\Dwm.exe
                            "C:\Windows\system32\Dwm.exe"
                            4⤵
                              PID:1060
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs
                            3⤵
                              PID:860
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService
                              3⤵
                                PID:980
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k NetworkService
                                3⤵
                                  PID:296
                                • C:\Windows\system32\taskhost.exe
                                  "taskhost.exe"
                                  3⤵
                                    PID:1088
                                  • C:\Windows\System32\spoolsv.exe
                                    C:\Windows\System32\spoolsv.exe
                                    3⤵
                                      PID:1096
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                      3⤵
                                        PID:1176
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                        3⤵
                                          PID:1872
                                        • C:\Windows\system32\sppsvc.exe
                                          C:\Windows\system32\sppsvc.exe
                                          3⤵
                                            PID:904
                                        • C:\Windows\system32\lsass.exe
                                          C:\Windows\system32\lsass.exe
                                          2⤵
                                            PID:496
                                          • C:\Windows\system32\lsm.exe
                                            C:\Windows\system32\lsm.exe
                                            2⤵
                                              PID:504
                                          • C:\Windows\system32\winlogon.exe
                                            winlogon.exe
                                            1⤵
                                              PID:436
                                            • C:\Windows\Explorer.EXE
                                              C:\Windows\Explorer.EXE
                                              1⤵
                                                PID:1136
                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                  "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2185e715fbc49ab3cb2e44cf4abbda36_JaffaCakes118.html
                                                  2⤵
                                                  • Modifies Internet Explorer settings
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SetWindowsHookEx
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2080
                                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:2
                                                    3⤵
                                                    • Loads dropped DLL
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious use of SetWindowsHookEx
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2544
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Drops file in Program Files directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious behavior: MapViewOfSection
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2884
                                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:340994 /prefetch:2
                                                    3⤵
                                                    • Loads dropped DLL
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2332
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Drops file in Program Files directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious behavior: MapViewOfSection
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1212
                                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275467 /prefetch:2
                                                    3⤵
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1124
                                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:406543 /prefetch:2
                                                    3⤵
                                                    • Loads dropped DLL
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2684
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Drops file in Program Files directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious behavior: MapViewOfSection
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2768
                                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:209933 /prefetch:2
                                                    3⤵
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2700

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                68KB

                                                MD5

                                                29f65ba8e88c063813cc50a4ea544e93

                                                SHA1

                                                05a7040d5c127e68c25d81cc51271ffb8bef3568

                                                SHA256

                                                1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                                SHA512

                                                e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                e05c715616d1f017b052dc4f4a118045

                                                SHA1

                                                4c50a50ada843cfe84a485f42d243c0cafe8e720

                                                SHA256

                                                ca357667d04093ce8e7ef8d15ea96a5945be371c78b176569e094d1234dffc16

                                                SHA512

                                                9998236fa331a0cc12e49820c4493415f2904fd50265b7be65db10227311987f1da87d8ea24672dd1f85f3e912d4f510ad93bea4d1553542757299170ffbe87d

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                3debd0a1b1adb1df4f5f5b58ea895479

                                                SHA1

                                                f94c645127a84a7a5129513c198ee3fd450d384f

                                                SHA256

                                                ceca3ad85aff8e2cdf0436b6e50fb847bd8c175f1bb82462c1882ade39f8fed2

                                                SHA512

                                                a8b061b719c09b762ecb5b4febcabfe9db9c2cd8850307f9f3cdeae35102696603c8ebe13b012807fae65bcef8babbd3f6a9d20208e06b6c70dfda905228bf5f

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                90df23e103a5ea99f6d79bdf078df3b5

                                                SHA1

                                                cb812dec4838c524852779bd5496bb7cdb300a66

                                                SHA256

                                                93a63e7cb6a87cfd14ec8271919171e1c735646283644db6fba8b017c192198c

                                                SHA512

                                                ad6c601907bbdee796d54a91b9dff9ddb6a54db9c2e8338127b5584a9f64d4636ac836f3e547e2a63ffb666cc0457fa5b9e96d64d8bb1a2028bc0eaf5e0a18bd

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                51bd7f832a899111accf9d5de784be4b

                                                SHA1

                                                131b5a022bdc21c796e102020ab8910635cd0df5

                                                SHA256

                                                2e8cfd62da6c4fe9675f3e4bf9b6eaf9290b825af3e8abb805b86e8c6317f687

                                                SHA512

                                                3e01ad57466267710f194027cdd050bc17929edf5008990bda7234fda973dad5eb225efa7acc2e5fd0e9b5031014f6f769e9d4ea3a95064666a2bbef1c10137a

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                898913888cb076552c42d08b3804320d

                                                SHA1

                                                1bceabb2d7a4101166858079cda85edf29191023

                                                SHA256

                                                d19470e4915b5ba841c75924bd24cd614de5e94b2ef943051b184508778916b9

                                                SHA512

                                                2e04c4ed4ccd188563dae7e15fecd7acdc0f28b94a9aa7f966789873f2202af40833879beb6bdc2d3965de9aabe37d82872a3572eb192a747d8cb483332a1c57

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                c686afce8e078c3caa47a64d3ce0ae5e

                                                SHA1

                                                46914f9db4722cb7e824bc8cd63f4d80004f86cb

                                                SHA256

                                                2eeaf10e62d4e79d6533c9c7c553c3f4940345cb8a6e8d61e3d277aac106992e

                                                SHA512

                                                b45bd3a6e025a36469056f0a6031ba0c3f926a5ab4cf023acc86aee923fd5b2a141895d1d9022bfe95a702c1b3ba93ec8caaba77ac0c1c656c6173649a0d5830

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                0c93dbc00ddcd2d2e3592174cc6f0300

                                                SHA1

                                                e2df903b6b01160c82745e95fa3d2709f490e5d8

                                                SHA256

                                                a358b5f109491c512ab5a04336fc1edf1d97a2d012b2da8c4c8b3c597eb98602

                                                SHA512

                                                3feb8f0b6c059d2f5b6137690614964b5a1d0fb6810aececf90965c8fbf5e4c8d2ea28f1979508ed5e85d369e493783fbb335b841b375faace1c8a7cab5cdabe

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                03fedec67a1c438485470a1422bd092d

                                                SHA1

                                                155cc7f668c9c05a1d87f5ca63f08a06a8db894a

                                                SHA256

                                                508b7d0c0e3b8805592ca4acca61beefa438c0850b9348585cdecce768d6cdaa

                                                SHA512

                                                1d9ea7c70e3be03432305de6f13a3a0cc10b4a65c649544b46ca46a600d4c4489efafb421bbd5fa0241698d5d9c513f9bc42e341ca8ff38a4be2c0e926d32627

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                cad76caec63f9ff3007d61280cab4eaf

                                                SHA1

                                                efc985f380483505d781b3455593f38d9b3f3593

                                                SHA256

                                                53f3bb57da9ac8d16f7ec6ca50a83b7ab2b5b96fdf6dfd46c325ced1c6035c70

                                                SHA512

                                                cfb69f209e9d8caef76fcb69c20fb397903ff4fb244b7c3a609cb8efb0e4089fa1ceeab23033ee6b234c9304f64e88261868722e709c5afc6a1ecfe569bdeeb8

                                              • C:\Users\Admin\AppData\Local\Temp\Cab1631.tmp

                                                Filesize

                                                65KB

                                                MD5

                                                ac05d27423a85adc1622c714f2cb6184

                                                SHA1

                                                b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                                SHA256

                                                c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                                SHA512

                                                6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                              • C:\Users\Admin\AppData\Local\Temp\Tar1713.tmp

                                                Filesize

                                                177KB

                                                MD5

                                                435a9ac180383f9fa094131b173a2f7b

                                                SHA1

                                                76944ea657a9db94f9a4bef38f88c46ed4166983

                                                SHA256

                                                67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                                                SHA512

                                                1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                                              • C:\Users\Admin\AppData\Local\Temp\~DFF51BD4342309A62C.TMP

                                                Filesize

                                                16KB

                                                MD5

                                                3427ea31cef2666d77a0cccf07fa8e36

                                                SHA1

                                                8289381f21bb7212a07ee95c3b7cc25f0916a1c0

                                                SHA256

                                                a463698740f3e04b4ec9344196ef028038cde50e91dcfc00cf3377227b07ae07

                                                SHA512

                                                8c63f4ea61e75173bacb924dcdd11d63710991a8b0a76fc2fb54cedcb525af6f22a0f7f2ce96b3f1119d92d79a2f78711a0263e6ac4fe181b96060e769e30b03

                                              • \Users\Admin\AppData\Local\Temp\svchost.exe

                                                Filesize

                                                84KB

                                                MD5

                                                bee6f1f011766a1f40f0318adc585640

                                                SHA1

                                                f9452d74dad86e1dd38108965e40585ff8ef7951

                                                SHA256

                                                c8f1baab39b7c77de4504ce7f758ef46c0659e01f6af6922d1a4518687aa6ec9

                                                SHA512

                                                13714e5ab6d7da1ab4faa85b4c9801866ffa89f5b39aa053a03aeb13d4adbad4d9bc518f5586a18bb0bc7723f0e6168940ed70d7d6cf71d82120135fe0d51bd3

                                              • memory/1212-21-0x0000000000400000-0x0000000000436000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/1212-22-0x0000000000400000-0x0000000000436000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/1212-23-0x0000000000400000-0x0000000000436000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/2768-510-0x0000000000400000-0x0000000000436000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/2884-6-0x0000000000400000-0x0000000000436000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/2884-8-0x000000007772F000-0x0000000077730000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2884-12-0x0000000000400000-0x0000000000436000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/2884-9-0x0000000077730000-0x0000000077731000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2884-10-0x0000000000280000-0x000000000028F000-memory.dmp

                                                Filesize

                                                60KB