Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 12:23

General

  • Target

    24d233d873ccb7f0e458e430b5614673_JaffaCakes118.html

  • Size

    160KB

  • MD5

    24d233d873ccb7f0e458e430b5614673

  • SHA1

    5896bdb57aef259a30a50727c3c45faae4a7e101

  • SHA256

    ea0940dfb5694b6a7903690997408f0e7ee78888c87d1ec0b2d5d70a6f1e7a5e

  • SHA512

    5c4322b46ddab01ec59dbe1d46625d2751fa5f4118e921130ff94693f30c179a129b1e0c521c9efed7fa3e2ff1e907581276f56131204b99492ba1317dd2d372

  • SSDEEP

    1536:ieRT0Rh0IUq8R5LD9keRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:iUbEeRyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24d233d873ccb7f0e458e430b5614673_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1156
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2920
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2368
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1604
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:209939 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b19e5c8d47a83017cc2b03fab4afa4be

      SHA1

      ec90aee2a7bfd36de72f436156786ac7852f5055

      SHA256

      66b77f837d6dd191ffc7e9a508e1f2facbfab59a4121aa7ef517e6b92d40f5dc

      SHA512

      c1bbab08d133ff01f37f92b8c56443881b97a5375c9d430b33986155b8cf492367a3be4d323ffb17c1c8f6100473b97a479e0d5d868a4d0098bdc78efd27ef9b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e4eb918819ab81842f027f89504c066d

      SHA1

      1cd01f529404e32afa6e91d9787d1e6a43730c27

      SHA256

      dbcb2d0c860422557d1925a39afd96c058691d190ce9c13df298f8c161ee22bb

      SHA512

      79096aad91616daf14188ff88101d46e5c7d81fe806c05c69c4fe3b1e88b875c8a836c659c9e793c320806f1a210f75088897328f5dedd286cf107e09aea489b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f4d0551f4f442ef04448813854285925

      SHA1

      c3abac3e4460ef2ed95827ba762981c92237162b

      SHA256

      c545ddbf137d08c56184bc3ba911f01bac09e076ff532df5568b5945b7d9a464

      SHA512

      a8a9f30dfd4fa56eee3011e549f99552ccf9a8813385c98741806a0f33b889180014139c369aceed820421f6724badce425d7ee4c6178712a4901d88f82627e8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      856aa5aff90880cf5b9cca9e11bb1ae1

      SHA1

      f311026d60ea6583018ad6592f00488122cdcca2

      SHA256

      bc9b88e8c1bea49cd038b8f1f63f2a4c5cce244d9b119275b75362891cfdd9bb

      SHA512

      a61560ac718888c7cc34c604b8405c59b371a83f11e71440d226320b0f0df1043e787caea917f3f1c34a15ee70a2530540a94e7e988526192118ad41afd1a762

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c779e79dfc25f9ab363e770fd074728d

      SHA1

      d6fc5290f1f1a167c9750017368cb1becfea925a

      SHA256

      3f37b34993d6e75325b3d616a0bb64c1bb419dd3903596902d30058ce97ee300

      SHA512

      6fe98a044d440ae3c3ae3156dc2d445adb8b9949b5474c64e0a5b95261072c22e36d0976c4ea215acd09802281ae88b912993779302aeda4584cf739f5175196

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      25d9d26abe5ce87bce67c0d38c432db1

      SHA1

      8cf976afc3401a9d5ce8ce07d9e14bd5e096c0c3

      SHA256

      7f959e54bf0e81848c0467cac1ce4b837286506927cbdc43903e232448d58fbf

      SHA512

      dc485d6841bd09994e98a9f5e82dd93906a7f5c74cab094e15572b95e2c5066dcab858ff3e1d32e52489fed238b26f16172672bab4233335c47f291642fed062

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1211e01530853786b6b6d44349f0daf2

      SHA1

      85fea6749b2cd31b894080655f2a68bc4b4ac6b0

      SHA256

      3493454e6864b62cad771da10a40942c6d49b82804f507f29212de1d9064d0c0

      SHA512

      9599ecbbf7cb1c3c36d31a17ed32b969c00feb4c4cdd7a26f7fd6e4d23603bc7bd96d6e8f692eb545e29371a0bb0abc72d149d80df9e035a0f9c19fdc48f78e9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      db244356d49ba5df48b5c63f771c7e2b

      SHA1

      0b9d4ed0687423fd86d4ed532f383312058a003e

      SHA256

      283b43c3cb9780aa3cb51e01a5d7c95225b8acc604188f20075a92bf14b1ec55

      SHA512

      2472dd9c717d0c60c3fde621ad514f7f6d8b339eb1ef4bf7c1eb45e7a39bcfe596c4865d183d4a588da3b6283d410f4521114b6df66a5e8d7afe3ccc808c13cf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a37a9264e6c475408cfdcd2ed8d6f5a4

      SHA1

      7acb17f4a7ae336066b64a48e8bd3dbe6c33cc99

      SHA256

      9d1c43686bd688b098b3802948ce16e0e97f9cab3c1863bdd35788abe05a284a

      SHA512

      8a8367f0819cb2fdb84dc317d244d21884b4d38c652919d81af491b0a2ec6bf601154fd79ca6e182072637302f7ae717314e90a62478ade4ae3ba7daa5fcccd1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f92acc0355f4838638fc21532b9328a7

      SHA1

      9d44d843148da8b9498e711502e19f97a71e5974

      SHA256

      4c11555d2d4f328420935a02c9f9b5bdb8cf99a06af4d6ee8c33c564915a0cab

      SHA512

      f987fc460172bf5eb3fe7f51196fc4ec523de3384bb12e6cd2c167f1589afd4353ea6c1d3882e4a5d6d4802b8b95715f7ab38369fb740c334e1d85aa9a1053b3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c3d1e630de5b514bdacf1537db9413ca

      SHA1

      c84b4b9bd17d377294cbc6795e480a63a12adae5

      SHA256

      c622eb8ccedda665d279a9103434c266df30fce33ad8fa023a6c435f8fb63459

      SHA512

      1e51ec134853acbd09271e3cfac3b8f530381c36a030eac27258849bab03feb148d083cd29a30e01d402230d13b02aeff3a6e1263fb66d8da76039a6fe69fcf0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5b53fa855c6515c24c4bedc9a2033849

      SHA1

      ff2aefce04652dee331bbaa1bbd9e01695736320

      SHA256

      efcb18de06a88b4dab0bb761e11cdbd6d1106d5aa7c171d1f3a19bd718edc1c5

      SHA512

      247fbdde0ba91c05c5e6970d71c9cff655a13dd6d9504b2edf7f5960425ad8f10ef1b0c8de85b58139af62eb9976ae77382971af59da4a42e585d29cc9a25319

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      506b76f6597011f90dddb3b1521ed491

      SHA1

      b4cd1600d7ab7ce3e8a259a643858e97908cc544

      SHA256

      9e860a5d31cd84f0a430d55275b70fedd36198a6b37634e70366e9b40558c784

      SHA512

      8905243d4fa1c3d37435dd5129a241851441095b71bd42a2676a0ed7a792cdf8a0da6b7305688377c12c4ec0d76ab868a518ec690f76946cf7beda7040bffd28

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      92612854ee9e34b68bacac29e6ef9fa1

      SHA1

      2bee0b26e4fb17e72865dd143e00d94ef16d9ed7

      SHA256

      62a6582049c2ed48d2a3bf626a0aec638d7fcd3a003814e62facedb4f705ad31

      SHA512

      54998fd78e56f581a198dacb59bace960986265d39343f82b0dcde1507afbccedfb6fb22bd5bcf40e219e082f816d2f5b1b302315e5fcb57bdce475547b90d00

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      33cac6e6043d7dced7fa680388d27fd9

      SHA1

      16b13c606ab8185e854ffb576a524303b9ea6ca5

      SHA256

      ceeb1bd910c9e57cf46f15fbd02ff5b254b43bddaee30b42da54d7eb9538f38d

      SHA512

      eeef628ce0123dc792f17ab5c12dc176ebf254010524308d5196a50eb4824e4f2c341d4aae118175737a523fbb58b0a83ba2733f8154b93ce63b2118325d46ed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6cd85220d1e302206ffad1cd0638b919

      SHA1

      afd9bd8f94f03e681ea3803ea644905f32752cc3

      SHA256

      fe1ce516bbc761b3daab576a2758c9487b8cd31a16000ed3272e41066ef97abb

      SHA512

      6fb338676a77b8c8229cd25df8d7ec7ae0670a842852def2bc31bd61648ec70469f0a397666a7b34f6944656729638659d732199c6e2251f941b3a396d550e8e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      73cd806c629f512a965052d406d4d313

      SHA1

      c493fa142dca7d82e7fb31c36c66dbf61a11aa46

      SHA256

      820af0c129364d740d153ef4fdef8316e276776933057f19b4e3a91d027865de

      SHA512

      c8f0029602667e56607b5b6de79ff27c37caba72c3d1589d655ddf3eeb40c394de44cd41a285e73ea93235dd5bb7abfd66249ae093bedb33997219528eb95d17

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8183c354e3332b1b2d0725a3577b3b7e

      SHA1

      f5251ae33ebdae605250a4e42f6e758cd9cedff2

      SHA256

      49ae60122cb4caeef1bb71eb53707b4bfd2e6a79285a24beffc705cd25b61ea6

      SHA512

      b2bc9bd973bc10987809745dbc18896bb462ea574fe7206418dd8dc83b7d1964b40f6fb5d66daeb059087091e0759c0780da2bd8519524528e0c54f048b5c63b

    • C:\Users\Admin\AppData\Local\Temp\Cab1C59.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar1D4A.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2368-491-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2368-492-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/2368-493-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2920-483-0x00000000001C0000-0x00000000001CF000-memory.dmp

      Filesize

      60KB

    • memory/2920-486-0x0000000000270000-0x000000000029E000-memory.dmp

      Filesize

      184KB

    • memory/2920-482-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB