Analysis

  • max time kernel
    133s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 02:00

General

  • Target

    3227db6f02768236efa373eacec8ac60_JaffaCakes118.html

  • Size

    132KB

  • MD5

    3227db6f02768236efa373eacec8ac60

  • SHA1

    f0288523b7cd4831dcf3e8fd671ba8510b576c2e

  • SHA256

    16f8cecaf11350f967bbf8648217c3ff0cce91b73f604ae146d69214204bbc07

  • SHA512

    3a00ddab31363ab44048625b60ba7df1a48db3c11d9243b4c74ef39aec6452cbc76f04c161872c7c20c27f3942180198fbf2ee03ccb40efbbbac683e604feaa7

  • SSDEEP

    1536:+snNx5s6jAyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:w8AyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3227db6f02768236efa373eacec8ac60_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2832
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275468 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ab08a3ab6e05d515d7f7b6ac275bef1a

      SHA1

      9bd4651e5d1887fb445ef0ca1a8d95b818b0f912

      SHA256

      8b307efa32732cc2f45f633babdf0ea1f3a38f501a07fac2a01a178769173b5a

      SHA512

      d81d31b51d73d1bd5a147631b17172bb4b32e8479804f8715d4c3de93258416cc2ad202f079d484993021d436a76b69d7af2940c10bf2eb48576aff8a7a4a1bb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      24d2b375b15e254b433ebddb55e6a4f5

      SHA1

      6e68576a831d3389d5c8d4161f33338d619a527d

      SHA256

      e9a8dbadc32f5228c22f067e1afab543a307109b2cfa2d1497b65930e016771b

      SHA512

      176b29fd3219444e6a651da24766fcd45aae619dd8056d4b54aaeef3480e56fcebc98cf8654bae9db48bb48ecce09ca2524f89791f9d29f8da7c701d4752e028

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d2fcbf3b1df0d0274ac60d12f9e64b90

      SHA1

      dfaafc81bced0ad81e92adb0c12d61db72b1a842

      SHA256

      97cc82881e275b95078fa4014db01dd769df427b9b0ac00235be764466477e5c

      SHA512

      cb79f56ecbce69846649f5ddaab2bc66c484392ec890a722efabd9c7fd302374c0bbf4af37b7b504df13c7005f3f7e060ce80dbd243408b8eb0e6aa26b323bc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6046c03118c77fa101c0afa3b98fedaf

      SHA1

      842a011f72c0e099147eb5b08990639e5ec43ff8

      SHA256

      a1095925435f6c5adc61420db9fdc1395234c04ca7db288efa41010f5afc1c1c

      SHA512

      7b0b9e419130f40215e1744d336dada5616505499227261a81fce4f048c6c389b4069dcfb9bc3437d398faa7b38094a226097b5bd3f40d8d13aa24b284a48cf5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bde878dfb5087a4f634e0d56e876740d

      SHA1

      3b89b536c0d33dee03678366cbbb786dc44bcf76

      SHA256

      972cd3460ee835584ce49eec40a60f70034c61956ddde742b5ab22ee28632c4c

      SHA512

      fbb5562b672d4d0cd615077127836cd3cd63c7177805bfe4c05930d5f231d7726c3f589d8fc84be080f1528146a3fe6a449ed80f857dcbf2459c12cf3bae6e30

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6ab907279dffbe021c5c11b9bfdeefee

      SHA1

      1400811199ac69442fa7231cb65eaac13b249141

      SHA256

      342a54c0cde16b4c54b1b550aa4c2864081b86ed0470c24119a6ec64417125f1

      SHA512

      985e48b4067a09f074dad3b372845275024e5e9000bd0999c52b9b5f6cac8ffefcbb21f86b0fb571d1bb291e817a238d71866be566a75eb0b73bad0e5cc98073

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1563cdc6837be245c3111d946748adcc

      SHA1

      9d34462813a1f598d0aed09ecb0a2e0a620c7c5f

      SHA256

      d9952484cfa159cd328cd6609b251bf073f57abcb7ff258efa8fd1099fe78e6d

      SHA512

      313a607b9f5daa5a0cec3de7d1e77ff39e5cedff4bf379cd8a29f2be44312e217ddf13c7c0429eace91562731aa9effd7d06dcb69a45ef471c3510bdc416c04e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d98adce86c78e13a608aa659e29e7177

      SHA1

      bffb625b233aa5f1717ef57e1b8b4a2f317ba1e3

      SHA256

      884d119f7b44ec969a84dc6aa3e5caca36180dd243063693e687eae7f275ea45

      SHA512

      275303c4a04dd325ab455d69b36bc9b99e14d7c3384ffa68f8a6957707c43dc8e6eb19c9c8340ebce67e0e75175fa2173e6668557d7ae87215e24cfa3c18b0a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      93167a2b2845306a41197d173e46ad78

      SHA1

      e66a5f766ff24344563087296f810c9957493e47

      SHA256

      553a2ca139c77af678a7013321d63c6708ad3e62405c711e4b15f86076404e54

      SHA512

      417cc51842a86f8ccc727a1fb466a11f084754a2e737248699baaad85dc85b61d47c9693bdc8ab7593aced9a3d2d9800b38eb36cf963288e797ca18c1aeca15d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      623c869bb481b81163ea1187d6bda83a

      SHA1

      1d2cbe4bc065c8450b33e9e14bb0d256e65027e4

      SHA256

      fb2b5d8c0dd52d66d104a255d515b82ab7c8dbc6992dfbd5770662a67d46e96c

      SHA512

      6387ec8a51e4ec4dd9b223c6bd730548e02e38fb8063a6d954c67b3ab2979b62b8ecf50cdf647760aa3ecbabdd1f338bc65ca2bad935a63909f7947b7bf3ba3f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      90354922a835c17aa50075a35e8be4d9

      SHA1

      ed9b7248334b0b3321dcade311e2d1b10d0f73e9

      SHA256

      fd77720d88d35d83685a79571cf95fc7272ced3d700034050902424e14394fca

      SHA512

      afbd8ca32d40f8ba805718f315ed90ddcfadf3a7ec64418bbb91cb02cb8f95fd7e67856da9a6f230880b2f1e4145dae9e1d0a4266c0e5dfaf3ea3764c006a4a1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      43819b512d1163da3c23d7a8b5f617a7

      SHA1

      6a0c1e62e4196d978329a75e8c54fe6a29583562

      SHA256

      459a92466e89072ae86d8791e8f4e21783b8651f79b31b2ac34862512d37d5e5

      SHA512

      a4497ef77a39bc36f1537628d0f8409b966589e56990ed0773649ca822d91d6c10aac24686eb0927f9f0ad1979c7060cfaf1f807b809f38f0a12bd61ce64ce7d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      029bcf20473c288cf80691c8ce700caf

      SHA1

      4a0037c794e4b9134031e3da6e01d70fdf683917

      SHA256

      79af1fdf467fd4e12504671c30337fe99bc49143eb4be6d9ada6203ff7a720fb

      SHA512

      161bbc9925d6a05694414e923905eaa33e21b47ab24f89c40b3217c650dd6ff5dbc4be1a853d1c2247912885bd1b07611b2cb953a5c12095813a93ae335841ab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      380208ca8c62b8e24d714d33df9eb9d6

      SHA1

      b5c9683321f3879dcc05da521a18585b717f3d84

      SHA256

      4b4fc0f3f5c8a2e59e58d9fc4eddb42d218c0e3f0c2a8e1f2d2ea68396dda2ce

      SHA512

      a6194a1b56c5f8602e673310770e49faefb4a36d3dc918e87769785205dba71ded0ddc7b7c819ff6dee7d2b5376f19ca89c9e527e5833000c7152e7bf5516f01

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      304abade1489a2f229021f5a803ee708

      SHA1

      07ff079ebdf29e809623aed10b6dbf4b9d673e72

      SHA256

      3780053addbe5153c8b0de7a1e43ccf3fab5372541cd67ecbc7baf160940fe9d

      SHA512

      26e36a54f51d0dd49ea14dd30a4d12a19a15b9615be072abc37fced781bdbb5052a00be3f098b7994cbabefc7caa4f6abe63cb61ae25c000163315539be6c6d6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8ae5b90329a8e9bbd541f30d68682797

      SHA1

      072e9cc82e6ebcd3d8bbbb039d3fc59682122848

      SHA256

      7f731d8c386ae6900d88932e350cbbcfedabf26f9f35e91c05472e4f9480e144

      SHA512

      c1f648d4b05f0dcaa25e8a2b81d37786fe4528e3869cf8444d9f9b7937454693f1ba4dd9201804e01abd7e3f15a2c0f462d646bb7632875cd268c10862ef9c06

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      388ea75d9f0a0b03dd51d1068474b297

      SHA1

      40d8268c7fe88f18e470d685e981e9211aab6bc9

      SHA256

      29a69a997631f64fa4ec890a72ee63c0255eb8c9bdf7022e46c357522ecce8d4

      SHA512

      2288268ae4db133443551b5ca7e8eacec8b6bf3a707104ddc5d4c0c2b510d238f2b553f8018c9eccb4ff347e822b5360096277773c47be4888d986274e762cae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cbd2eaac1c3a4d0dc3ed608488ae6909

      SHA1

      3585664adaf0eb0d788d5a54da7f2560be3ca1fd

      SHA256

      6f927b5b96106497a1cdc5b3a7ac0ed22dd90e2b2cd7df046e4e0415c532422e

      SHA512

      59311ca7135d4453969830c6ebec48f7874ca43e26d822a4004069bac83c3ca7fd30576f4600f38458dd9f0b2e045547c429cd4e059d463c867c9907086b522f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bdf368a68b34c900ab703243ba4f4ec1

      SHA1

      b2ef0e0055c7761f2ddce9410c23922fbcf57847

      SHA256

      48375d6a5210e0ee761807ad84a6209593ec896152e971ff4597bacd2d0b688f

      SHA512

      9470691afde3967764aa806520514b4d1084675f52296d28a7f7d75b58b90378bb66ce268997f824e693a7809dcb2a8c0f47fdb59dd4aee6cfb81b2132e12e23

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      73f9f9c4e7bbdc642ef598383b8abf6e

      SHA1

      f79576b0b84c0cc428a474e13f774c38dea058a5

      SHA256

      a8befce4d97fa2d4720bcc2019d574ac5c998e1d7829cc244c468e12678a9fdd

      SHA512

      c7979741987b47f969c80a000575da25891049843b3a8dccf6a2c3f4e29a8687436b55d27e35b5c42da3a6a4853a736fe42a68c37e83078dc98f2741f315aa9f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6186336252f70c38eff32abd19fe8c1e

      SHA1

      e6261be216681de1d7bf852c90a7b89b3a4955ba

      SHA256

      b32fc10933997c99cfafa8fe04c49f005e2e5ef2066bb447497d06d30b3dcede

      SHA512

      5105a0cd2a378ac03611bb845bd7844eb902f44524836d881bc10a0ac5202ce7d0a423605113b2d4651336130ca83eaf887cbba0e4aa02e898d81769446cb9b2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ff3aa4aa8f0acffdae67e81eb58fed59

      SHA1

      91486b80269f4a9441d6bb9352ff6165368f3f2e

      SHA256

      22c5135b2488a21f676f6a126c08daed60048579b98c4c0ce1ab86ae8ed8ac16

      SHA512

      fc6e4d742b9ce71f66c20f83ff6f00430a4835f5a7be33dff269284d1daa3316ae158361e74cb386b087d5a9357d436898fe1cd5d470123dae03e54de37135af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      856fdb178c1e2f8258b38b4263209ece

      SHA1

      85e6ba1846d755dfbb5f85b8ba360606d48e6ac8

      SHA256

      a284b2606b3fbe734a2fe826ee7282f659fdc0abd0ce5388fd450effc8313586

      SHA512

      3c2ee0c87bae3a8ce5e89b2a76707582ad080ae86c124c1eea8d6182b2b5b6ebe936a1280195df668fb278fc80623fe64f5442839fce1d12ba69f51e4aa8a2b6

    • C:\Users\Admin\AppData\Local\Temp\Cab40F9.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar416A.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2584-7-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2584-9-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2584-8-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2740-19-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2740-18-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2740-17-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB