Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 15:18

General

  • Target

    3ac5e7dbb09595fe63b3caa279e54992_JaffaCakes118.html

  • Size

    155KB

  • MD5

    3ac5e7dbb09595fe63b3caa279e54992

  • SHA1

    b32f5ba93513eae90ab692228b9eb6f125e72ea3

  • SHA256

    5dd3b98088d86efc744e5244568250635790c06995a77076a8dbf2b0be780b09

  • SHA512

    cf51422cded7bbf2777d1b722c5bfee6f7248de64dc78d188eef486c2cbf3cf478f13c99dce70e08379d501c3c20694a7b066d9a74b1e247deaf078ba9d17b83

  • SSDEEP

    1536:iYRT+qzuugae8zEXyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:iSVgfxXyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ac5e7dbb09595fe63b3caa279e54992_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1840
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1648
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:603143 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1468

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      35dcde836455369164578964a02f58d3

      SHA1

      e38ade42fd6df83d9ee0324ae57e0de365876e87

      SHA256

      2befa1036084a9717c7d32e2acd27a3b2426d0a7d5c22fedb5f6728ec1398ee2

      SHA512

      8deca1e9f270cd543baa4ec69600b1b5f510c7e2c75b1d0ec61ca65a63e9a87167c2f8d555761493befda66d9b46ba43641f2e3690a12b373fc1d7ffbba9f626

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f4fdba5975e6063b49a2b7882ad35083

      SHA1

      58cdf1233a0afd8e10c63990d29e924c64aa039b

      SHA256

      091a2322fcb6ca89720c4198804f9d139c4cf73aa8ea82904d71a34e4a665045

      SHA512

      c86d4ab716c5b0789ebd3f40feba000bf3781e7edc551427a47c33f4349d483923eea9ab416a1c13336105d5a681d807eaee6a938f418f4c6d806a701bd5a1db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7d9a5bfe7c10f7783f07b1dec7eb27c5

      SHA1

      94df65af25d304462a837bbe8ebee4545804fca1

      SHA256

      918a8320d82b61bb1b04585e380cd0d7662d4b306eb2ddb297ae0dd5c65d7e6e

      SHA512

      1d37556efea898f1f907fa8034cd559d3c5498baca644c4b462ad45d8ac91c1905d6ed48d421a689c00b62dbd6bff70bc8c7ddbb7470e2e56e328df51cf8219a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9cb437128868d5c4145871fff6127dbf

      SHA1

      7291405bd5326fd857724ea7b4389124b52a925a

      SHA256

      0d5aee2d5984dc101009af2c88e1e762049a2ebaa48728dfbf1dffa07a5751d1

      SHA512

      c2bc849b8d1cce73ee2418c41d5a3dfee6b5b3977633622de76419a1595abb9e09bc104b04eb40adbd91323ae15f1452854a7b42d764af1b49e989ca7fd6a4aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9b39b3656d00940204c917ca96951b6f

      SHA1

      b57b05936de9bf94d815af3fbbbf1dd7a889a4bc

      SHA256

      c8435a3b5aabaca4173e46011fc68739f0bf1c37f0daf2d0d0082ab71578e6fb

      SHA512

      32ddd581d4da8a5532dd25cdd2e400932c408e13e9b68b2b616cfdefdff5a328510e1863d88571cc935580a9c37f46ac1e28e98dc76f45ff6b06a919605d810c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f94d61a427879ba2357ce81dd6a01202

      SHA1

      40b598e6d8899c5e13c3e1246ab5920f5e3fd79e

      SHA256

      ae082faa4d7aacdd690cff1acb04e16d5c245dee0d2f0eb9e057f64e96dfc0a5

      SHA512

      b61ce522b0d46c986abca83cd2e76469e3e29750880b704a8b33d17d6ce11c6a3237440215c76447eb4ed0e1066a88ca7b62dfcffc80e04bdf9b9dd2d64e1910

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f1aee5ed763c01552d4de79b37b0bfb0

      SHA1

      bc60615a14a272af0e107f4a574287e91d6150c4

      SHA256

      fea9b5a4156181f3535b29f75e7a2f80ab133049b97eec672ce02f567ecd69ae

      SHA512

      57e04f3c68c13a8ec0435d800041ec247bfe0066d23685834128f209e011a05d7b87e38a34f4820d73f4e74386c643ff9851b4f3a3db59d50581b8b9ccfc0680

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e524f999909905779c91ff774d82971e

      SHA1

      0b20e02502b305c54bd757f37a4bcfb96a2777c3

      SHA256

      b004b4dfd1379154061bc13084b58724a124060ba0bbfaa917996bbd69ad10c6

      SHA512

      0b11153f2afd093572eda6cb7a7afc068efe605e95eaee3fd8a6665d2206ac98e7d1c285761eddc7816ba67ab5d906aab4fb1c6f3e492a5636356758de8ccb0d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      809099089a383251c2ecbeb8656ba2e6

      SHA1

      3e0c2bc672f44cbfedf5107d048b0c7aadd811b6

      SHA256

      ba6b60fc76259a32b36f1fbdbf062a2ca73c28e14e372daed1c49a9a6ab7f65d

      SHA512

      7dd30e380075ae0d65b1511d8d4de245d680bc4041057985c75584cc1a8b74626b66e0a918018ff341634041d91406ab3a85eedd911137f95621ff5e765bc7c6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2da3827dac9fa74c34c3a75201849fb0

      SHA1

      e4eead27ab1d13a110a5086e057fc3afa2ab715a

      SHA256

      35a35a79daddd4278b6219a3ba074a21e14e53166a964b65f21ae59ffb33c03d

      SHA512

      5d2b0ea34d3852768a2e79835678332d6fa4f47888cb03aed051593ab6ac064b09de36801331521b7217012d0e249ae8752cda23c3883a04b54a7b36350dec4e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      73ed187bd78b848e1ca7607cedd8307e

      SHA1

      7c25391a38c7c08d81060658e0cf86d7696c7a14

      SHA256

      531c182330af981a6dcf751c6ffa7a89b605595f19c0b0dc5620060f109991a3

      SHA512

      102f6dbfb04adb1c11f9a7e180557ab08a1ce5024b6038f765bdcc5e4921d9a990ef6de25863a0c839e1025315025087a0a4205f673202d63e31c54ce9dfb9bf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9d6f6f2dd4a88532cc341e175d0b5aeb

      SHA1

      647e047283043e7d53860174ecc6e99ab5924cc9

      SHA256

      c69d7eb9d3a6be5ba2a08e621c55cd43dfbcad2a7be86d580c3b5048449868d2

      SHA512

      ca59bf2c0f53d1f1b779cf57722e40b8a4e549995f789609381d9a5edf96058d7ee9ea1fbf5a5f4c6e053e2be583a2be1158477936bd9cc61f46aefef51b634a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3f9a058902367dbe2ba0e4d0111bc05a

      SHA1

      6be249395a51582b5e3d45384d4cd2ea9f3aeab2

      SHA256

      2f1a34578d6b465c859a82493aa594bca9a8eaf5798bcb832c0efc0cb0d67f2c

      SHA512

      410afc5e62edd12a25ccfd33d053c3b6929c24a532055432b530d499c6823f8eb668b7512dca2a6b130c26bcb3cb5c5088fb5a1798151f98fc41d5eead973576

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      27fe1ab2b9a534ef2714b55eec4c36c3

      SHA1

      878b09370db6ce8b91dafa362be4e5924c1ac5ca

      SHA256

      00015bfc37af4e4d87739881bd69f23feba5874ebab1d14f41b6faa67ea0f0f1

      SHA512

      634346466e158ea5118fe863aa97e0ce96d59cc7e79ddd2cc726cf49ff09be193172078fd43ad0df474ceb5a4d5dfd256ca31247a2f7793f779a2dd85b7e56f5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3aefeeb873286600890bed336eac640d

      SHA1

      5912cbfa1f35ef40cee87e211b82836d81b7d98a

      SHA256

      48a16bdcf232d0eb817591dc2e1128c6778bbd62d193922989e661785e05a0ad

      SHA512

      181fb8a078e47ddab63ca6d2c9a3cda4bd68b8aec5056192c48180ea42db1a115cb1a3acb1a81608d4a0635fbc05856f3c9ca0d42cb34f1dbd82cd5b13199c25

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cea02b1165ad5d7a691d0f24c0b2a3ca

      SHA1

      811deef69296982fa44a2d96d6a50800c2b94bdb

      SHA256

      770fbf854379fb4d356a371fc644c76cf0dfa3931295cbd0d956f20bc0ca165f

      SHA512

      fea1c19b2e9beeea821d3a1792136bff11289d66d6b8dabce247deba68bee77455583e66ce6c185fb7c0fb36ae3d45fb39d67c438b7099b60ecfe1afcd6eaa5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      084403213a5e6d8e25b0973189178917

      SHA1

      c1b7472eb870e97f1aa753d3b13e223d09b4e755

      SHA256

      bfc88ab6ece0f34ec27475df1ec1d877ba9bb3709a1b5a94bf3910b5893a37c1

      SHA512

      1a58026b3ceb86eb262cb34f656d86228abaf74f548dab8b69b01cfe1db974fc5d9699699f79e98283d25fabc21f2933f98cf43179cbe664b918081b9ac25a2d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b2a484fe68c6b91901d3e197cd21a455

      SHA1

      6101552f729c5291fdf7c15cf95e43ebf5e6d022

      SHA256

      bff1e81a9609432a349f0bf2af768f646853cb86ebd29254317ff47fb2fd4d45

      SHA512

      e5baf3aaed84e935ac0c2154b823e9bd7b314132849fddd2f9c5022f32b79e09b628cdaa9a6baa33f69c8daed76859f6894f6401c563041d002757bb961ebcba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      540470694f7dbe745e4803171b97b976

      SHA1

      f86795da4bc992fab09f9c54adb3b67f1c9e314e

      SHA256

      242ed0c608b0341135e725cd6ea12e6612fa745896dcf53c7ea715fa288a7684

      SHA512

      e0f0da8a395c08b3978959d42717f7df9085d886ec702b7ec31ef76bbe33b9f07b30299814ead5de0c7cd39675ffd14a404387bc8b48e7937a3979cc732a6da2

    • C:\Users\Admin\AppData\Local\Temp\Cab10B5.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar11B6.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1840-482-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1840-483-0x00000000001C0000-0x00000000001CF000-memory.dmp

      Filesize

      60KB

    • memory/2724-493-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2724-491-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2724-489-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB