Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 22:56

General

  • Target

    3175271da2f2651716cb332dae3ddcea_JaffaCakes118.html

  • Size

    348KB

  • MD5

    3175271da2f2651716cb332dae3ddcea

  • SHA1

    fec967e7a5078bcabb3f9508706d219c3faaf753

  • SHA256

    3a1d25e6c7e957920c67019bd11091f3485e90d47ae42e314b6b6a98564e83ce

  • SHA512

    ce6844d7643cbcc504064107fa93c62066b1fbfc539bfa5394f6bd21e2e7df31b6b491f37eba04fd44aa74a65c5f295d110c37aff9ef94e9f87da18706019c3c

  • SSDEEP

    6144:EsMYod+X3oI+YhlsMYod+X3oI+Y5sMYod+X3oI+YQ:S5d+X3V5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3175271da2f2651716cb332dae3ddcea_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2200
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2172
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2480
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2924
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2932
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:1572
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275465 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2548
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275470 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2628
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:734214 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2508

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe

          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          09f4fa70295fb126f25781f8b37dfddd

          SHA1

          3fd6cf833301900b37e8329db630e5b42f3fc22a

          SHA256

          f61b6e1980c54a4258024e68639c60bd81b36845da6dfb5bf569132114f564da

          SHA512

          ad6bd7f89d8b46ac8fe981eff56ae460c9667a22830903be5106589c23107d4f2b611acbf660a8eb1b533abeefec32233d14b101d85c4e98fdd0a7af35439e9a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          68a02dbbaac808e76f34ee5b00404861

          SHA1

          1c14a4f4f43c61da72e2cd61aff2b175a64a8ed2

          SHA256

          5106be54c78416a6fea08c893561836818b80e5f40b407c6b3c668f50456af32

          SHA512

          cd7e4fd3aa6dfd067742af124897e0a22a67b48fcef293b3a1531a6139a382c837c102190c7cfb6d11ec91dcc64b422b532bb9088283731775667802bbe7151b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          36000db4611a751d4ff9abfc7ddb8e1e

          SHA1

          116876b1ef1c0e4c6a3963cb060e024ac8adc108

          SHA256

          d1ac318ec3148693750b13b96c46835cdc48b5bb9f6c695369eaf52cf9501613

          SHA512

          c86ae354c00ec53cc0d2b8aeb58059245998f4c0d85d2e0c9766d9f55ec0d0f98310d8332822c533b344cc98a97581b9a497b99a1a047105b33d718971a0031b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          42fb17981ab5ac3e6d7fbe533426d666

          SHA1

          a1dc962c4f2f3494c6ebaa537d5a0399e98d6a72

          SHA256

          b3af5a288397cf0309b0c0f9885ac04cb6d879e5f21d173bf3b4c2bc8f3126f6

          SHA512

          1c52c0fee5085fb1e6e28fb9a210a68c420019bc183e418536c41937d075d720e8fef826371c1c46465176fc518e93f7daf4ef8682b4342cc0d5b8725bb5a142

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d9891092660c745aa57fe6966fd4d02c

          SHA1

          2d41a9d9807ecf68bf78db540f3f333c3a4acdaa

          SHA256

          b3a2674adb7ed4deac962a7cba5df9580304a18ffbf04c99f6767dd9457e3b2a

          SHA512

          346d1f98124588659d4f5a7e47d9a36295176355de95cf53b0e56ea9fbba3a4794b39ac880d86ccc5975f4146cc8f810be62a446fbd6ea320dcf5e17cb508c63

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          10c682000560fc589ae2b819ef40127d

          SHA1

          08af72b4583221441ea6f25e89baac3ffa3acf51

          SHA256

          c280b74b01b47fbcb9a0cc9205166676ddea8bbf936b0969809c7335ad5e2e50

          SHA512

          ab8305c3875513f6894b4cf57ee45417697180b1b7b85b4b60d108aa21f390bc5794c60a1fecc10932c3a860d389021d929fdd02cffcdedbe2aac29ffa5fee70

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a53842182218ad54d343eaa65efae272

          SHA1

          66edfddaa629626c5d3e5fd58eace081011d694b

          SHA256

          4b00c1c26c1a4862e7ca5f2189abf06069cf5f1f698994130aa1fe90737c8a68

          SHA512

          8f1c9a0935409170b02995de671491f6bb28b33630a31a2910e48077fac2fc9581d8b5269b216deac3fb1f3303a4ac47f33fd0ac5b447386e057ddf2ab04b100

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0c31eb2c43e67d1827f5e0c917a0565f

          SHA1

          38b20776c5b71f69fe7eeaec865a6f61552661e2

          SHA256

          abe36ceee018eb64b42ed1af61ee03e68dd917bc734037b95f4551fa848bf553

          SHA512

          6558872ccbefcc0ea964002c3b1ad970638a0612d99f497d8f0d230812020d4088498e3b2279e2d441bc962488609a225e0710b3e53756a5429d0a908874690f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c48263dca923f9ec8740818e28337825

          SHA1

          bf73d0a6694ea33c9c925124e6642a745bc3aa52

          SHA256

          401d093b11c3f7d5f90b5fef6f264576e8b019fab180426d142d13d5844f05d9

          SHA512

          a4f57faaa807cea338784319d79c93c046500db5a7b8d6dad115959a3d96e849996c6230e8d0de038d4f6e588f7ada034f497d8d4ed89b96f669b402e3d90966

        • C:\Users\Admin\AppData\Local\Temp\Cab1B50.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar1BA1.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • memory/2200-20-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2200-18-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2200-17-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2200-15-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2480-24-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2480-23-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2480-25-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2596-8-0x00000000001C0000-0x00000000001CF000-memory.dmp

          Filesize

          60KB

        • memory/2596-7-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB