Analysis

  • max time kernel
    118s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 18:26

General

  • Target

    3c321dbd80c28a75fc0156ab6420b13f_JaffaCakes118.html

  • Size

    138KB

  • MD5

    3c321dbd80c28a75fc0156ab6420b13f

  • SHA1

    eb4523fbe65853307817a28cdac4481699a41b58

  • SHA256

    484606446bb3c3b1fbaed6c3d8ece41a1d877df682c634fa5d09c7a5b1cb8d9f

  • SHA512

    941ed8c9edcaf6af57d0ca8bcb8d83cb3d1f4fb0006ea4c480e1d667a771a8a01446ffdef09055cabf9d81864a2e9aeb27882521f48b58d2c372807ef4a4081c

  • SSDEEP

    1536:NjuUcNjyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9w:NuUsyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c321dbd80c28a75fc0156ab6420b13f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2572
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275466 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      922956e3c223396d16ef274465a60a9d

      SHA1

      a7199813af77022d7f97a62a729bc2f9cafa14f3

      SHA256

      82615d9d71fee821b76c238821a5759fe96f2c83156207f1e445d5f0a60fee45

      SHA512

      1efbe416d200acc9871e7dfe9c0f92c97f6608b81a0398b5bbee3fb8856ec9d21aa223b449d60016a3d57b712d7fdf3acaec7fae171d56f9c7a379789350888f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2169d2773ae85f9f12dfff5127607292

      SHA1

      a8fc7d8b83275b09842abc354243c49d5722ee63

      SHA256

      bb2e43984e0f5a43418854972610060979ef5242885e88e335588502f39db422

      SHA512

      0ae1a8b0d7d430febbf3d87d7a4c9ae46a2cee521b9ada59967e136d1dd577953d9e69726d72632949c115567a1ca48d5e1339361cac685f32b0bc377a4c7488

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      eab70a68a738519ce522026f4514ccaa

      SHA1

      22f278a7f8b53087b404733b01446b333aa43e35

      SHA256

      05e9f2a7e8160d4b0b4ec55da7b9a206022a5b9811cad4880a6864f94ce3df43

      SHA512

      e62dfe6b58476f221d28d861713631319956092e0476f7f0b059f086931e94345d141dc1c870ffb57c473ef0d79e85296caea2e1adf701515880aa1fe3830599

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d2b994a92c6ab20de7bdd94dbf42a7e0

      SHA1

      098d24b0135c81543bf1de0ca2657192720504d6

      SHA256

      9e6689d3a68fc1db269cc1d3b793a34a52d2a872085841c462577d25232c38b5

      SHA512

      c0372cba1bee87de0bc540bafcb0827f49371ce7580f580116abb8e798a42be95320e5b73d7e9af4b2dcd1bf85b13c3d9becc1a1048005165f74c87a71516988

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      94bd4e04ea6b8f23d8875e765d7cf8f4

      SHA1

      f9c6215908bf7cc724e523de51f59c8ee9788a6a

      SHA256

      99924e49fc169bc7d8830c18a721e7d7023cd4ab71888b40ec973fb951c593b1

      SHA512

      41843661ccd08f638e26190bdac3c1a3f181b9ef63cac70dd9412c4547ed66cd13d8052c927ea5e8130ae3fd7a18553c2d11dc726b08855588e0a200350d8147

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      aa435fc651fdb7638c961a56f4d01e07

      SHA1

      2e6f1a23e8a8f00f92c6f7f7f3da1c9ee03d001f

      SHA256

      23e1391483b6662017bd32765925d6f1d73fa73b278dfd09f9c55f34f0b6f4e3

      SHA512

      5e854c6c15085e0792c6492e4bd2dc84b25cf633ed0565909bbe406c86c9dd70419441257be6b2d38c9f0363847f2eadc0a2bc7c3438115233fe29d563c7ce07

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f743c1b7a09783aea1d37d1e9e062035

      SHA1

      f85309c7feae70a3f31b79e82623cb7bffb4129e

      SHA256

      6ae49cf0dd01a9597384cbf0b0ba3f3a54b64e9d2e8b6903dbd957ca94ba077e

      SHA512

      4f0b98c7bfee05f328ba195a66f9eac27cc07cf9871bb4321fd2a4d5bd50e67611c9f20a91f15bf0181ba8f3eac6f5217ada3019a151c5de5f08d0962a40e6fc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      31246599a553cdc17ec25151447cf332

      SHA1

      d021d04207ee03afbac3f5bc0fc8a61e669eabbd

      SHA256

      955676530bd062a9403627abb795f585f1de744af373405c97f1d1e2655f278f

      SHA512

      eba1fc5a40e5aa23001008a692c54c6a4a41e6111c8ce85f6a0cd6ca884cfb2713a0eab6e6540bfc73a179b115dced8bc9a1f2fd7bfeae2857051c5192ae195c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2943f10d2aad0f043254db1c0ed46f1b

      SHA1

      9a544cdbe59b46b51e3bf20f6990fbe1ec654538

      SHA256

      e830a539adf1b3dbbad00baea07f226406fc9b39d579891cd87416009046ed84

      SHA512

      c804df90ba8fbe5dfdfceb3e4c017a2abfaf4dd6b2cffefd46fb44112d38275f5470d9d18fc528be08b7e5377dcbb469e257ff3ef155dfd45d5e4c1740b1110b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a22179d1741ccd0a5a4e54ca8714263b

      SHA1

      4dd3471ac36efac7f69a352c0ae8de22e063f095

      SHA256

      f527e84946581b938f9c28985d2b2f4c9afd6a0ab8cfa6491f83ffe09bdf1b13

      SHA512

      dc82f18d33f7f57bfd5310f8b444d27c24fb8b43cdec99ad7166f19b7c888d3d496e9c581f81f826e3b791909227b0711ee265d4f14df4a2b69c4d6ba8f949e4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8439001252b02f57aaf3ac86f96b1d3e

      SHA1

      c7c00d9540e3ac6b868e71bb6c394d0bbea3fc31

      SHA256

      843265a5dc9216464a373c4b80ba965fd6ff233369b5645cb6fd4089e4f1600d

      SHA512

      72a9746cfe00fefb4e7dfd92bb74b7b8e367af9002036b2eb347fbba756cdc30ce24927c8ca0a851f0645c62a352fe8040a39e14cf176b6accb6125bcb064829

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0aa4cadf6a9f28b7aaef08878119ab36

      SHA1

      f22268d414d66c495fb8bbdd568e96ede3f359c1

      SHA256

      adeff487b8222303428377b2baf4774ef3835653f4b32e418e13739fd8131466

      SHA512

      d7b583c2fbb277054352d898d40e11027dafb6cbe14167bb8395df6f04a8550c57731fbcc1be4ae5dd46472b83f51d41fe4ec09bc330ed8da362b4e09367c50c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fbb3a55e5ab9695f2842219b0e5d52d9

      SHA1

      ce47a31d53c81c4cbc6c357009565cd5bc8ef3c3

      SHA256

      32f581a790b2b00df186eee4f7e26e1d5f1470eb9e11b82777fdb26f7ff5b39f

      SHA512

      a812a42e061de4f685c0db9267734a69c2a0d0d37565f51f026adccc487497d02a96284c80412a85fb1179eda7c51b0a17c31424eb7c6d85b8246e8abe2c1336

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0b355584025050d5c8e672a95aea4504

      SHA1

      22dcd61b612616acaf7568aac351b238760ee34c

      SHA256

      4fe65fdfef4fc850ebf958a95adf1e27ab25531d58513bef925238743c8ff8fa

      SHA512

      9a1b467fab5d8a9e7ef611b9e501fda7ffb2b343d3bf30d6f03f1bc517f7877ba591ac2e9dc0524df7918796c1e1e250c3f771e06b78de98c5bee4bdfb565e63

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b2195ff1c1b0d3f61b4983ec2b7b8567

      SHA1

      a1e3afa7b6815b7605bc0924bac43e923ceedf11

      SHA256

      4fcc080cc337ff3599929c00f4401a6497c1c49a7b5175d5882ca4819cc113f7

      SHA512

      1b45a6a42ec4f7e2edb2beebae3bb4dd3cc22ede1122e8a7f572330da374f539cf480dad73954cfa52a1d9dbda68b53b6add8fcd4c9353c1c6c59193a1fc1e48

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      75550c5e66aad6b7daa143684d1ccf05

      SHA1

      a2c4681b61b5c32409dcaad0f58b306552eb0242

      SHA256

      204097f8351e2d3b0e6f0b127cf611d25a8155cc98843d95e9b5a1fe9f5c8e67

      SHA512

      042daa56496922d10f6907df933987054bc7219526de5aa48eb2d148e6c65857fbb320ed2f85f71a9cce0c640b01dcc8b5da2feb7725e841a427d9e55ff25b36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7520d5414649d4caaae531b866f20b57

      SHA1

      82464f100b4cee384909d3bd26c7d7a91eea6d35

      SHA256

      af82448fdd652567cacfbfa01ca8f479e2fe5ff6a8eca80aa8dc7b321e1b5559

      SHA512

      029a7b54e9068b7fb44cdfb135bdf2d66ef4c44938f7bdf59d83b0feb70a9be1dd475999965477ba27dde809aa9ed7bdd19adf5f9581de5ac5cd193be2d9bbc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1a913c5e8dae465afd2314312572aab6

      SHA1

      bbafb32b40dcea42d4b2f83c94ae7fd4a05ba90c

      SHA256

      56e661312a444bd5385ae02b09ed7574d49b3eb0d7e3e5f30a9b9ddc61434123

      SHA512

      7a03a95475d08abd44849ff2fd94722a928c6ddd2aee60f3797063aaca4bdbbb835615a8e77c6414cfc55fe2ef5e26fe2f3ed268ab1805943776fbe57e7b7329

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e99f10fcf6c56d61b6005a61c23af9bb

      SHA1

      9a3c24c907d8d2c0080e8e14f9464d07f62e6675

      SHA256

      cecfbd729dc65050f4e7f1be622667e117ba9f631f3d67a1e40ce28c7559e812

      SHA512

      9c7bd1d6132f8fbd0475a81a33c5811b2d32aa862319aba678b2423cc7abdc0b96d745a20c4ca97028f385c8bb2f57d4e3de66c97cb91bd64f35a3f3bae54a0a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d3d943eb0bd636e1f8930451e7313577

      SHA1

      61ff8178010ab5ee4ab820fae8a6bcbd00dcd494

      SHA256

      da1547d56ba4ac1161258a9b8416803e12c77f2cb0382d3795910df975c14377

      SHA512

      1b5d0424d5a440b45ad659118cb7425a3dccb357d8bbac8b60f98ece0c392e254c9e648728cb0e3188b37d634ed652d158f8bc14270bffa974e6ed44cf372fd2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      72152e56065c163a611aef76f5eb8c91

      SHA1

      72fed2395a4806319e469cb1ff5afa753b491cac

      SHA256

      c620a3ceec11ec4cf93cc57cf08dc08dcfd4359e9063b50e8fbd13a86405151c

      SHA512

      574761d80c5a0c0a340372b4cc625f3c0e52a0f95d42e9182d182bb951a34ab022b1da22736e69ca26ef7fdad20860e0a7a069123fc4e5b72be273bec8274e5e

    • C:\Users\Admin\AppData\Local\Temp\CabAF44.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\CabB051.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\TarB075.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2576-20-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2576-495-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2576-17-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/2576-18-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2828-6-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2828-9-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2828-8-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB