Analysis

  • max time kernel
    132s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 23:23

General

  • Target

    48887cd949122e6bc1459d6534a0b8f8_JaffaCakes118.html

  • Size

    162KB

  • MD5

    48887cd949122e6bc1459d6534a0b8f8

  • SHA1

    84ab8421f489f29069a7e08defc0dde994981d34

  • SHA256

    dc5f79a9a0c43f1922ca45a30e924a9b7f686e7bfee6075a9976e1c54f6cc956

  • SHA512

    09240ecb509b7eefd4819c195a580bd260215c9a1da466251b4dba49851185f243e519d60d1a9406888d710327d125fd6e32bc1d64f569e9db91e4b39ed5ba79

  • SSDEEP

    1536:ijRTlEK+dsnBJyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:iN9BJyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48887cd949122e6bc1459d6534a0b8f8_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1784 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1428
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1668
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2184
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1784 CREDAT:537614 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2056

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      24037e8281cf925a1f3c0ed6806937ea

      SHA1

      e6a97b837eb9461af9aa4a10811813bc7dd2f97a

      SHA256

      70dcd2a237bd81a6f7f828a0ddf03fde76ae965c58b7cee6e8eda1067095f1bc

      SHA512

      2030a8766b0308038244b3f309d56c31fa27026a18204e467887f53435698e6a2179ceab761697ef47d7b2dbc12738d00db89f365cfa94d696ec43e328083d77

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0ac62e84eb7732a8d7813b3af55f819f

      SHA1

      bc7b0761ba6a737d8e108bac6aa04a2ef883b4a8

      SHA256

      df9e65b3ff6223a90ac44c7b386069e26563657191ad8b8fdd44a4c38529cf4d

      SHA512

      af5d06acdd4609c8de5fb38339fcd85445c25b2052e323e5b9a581cf235573003d8d5428328aea7f7542d63e85f3ac5c79d98f66b41099e7d6e6cca480288aa6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e951ed383892dad2652be2bc1ff4c2d2

      SHA1

      451e7a744da38ace173ad21c57d47ebe7b9e3a4a

      SHA256

      6252cd31a2a3f5cfaa1a8c5e02b439506f018b03c829668ea4e77cc02dd82706

      SHA512

      5fb700e8570cd2c0e93e910b5026818cb2befb9a4f68c44cb9494ab74f9549046489dcb0e25440da46869b21f8258370984708c3a95522081c351ec39e938664

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bba8fb1413da1efef4149da541056288

      SHA1

      6d8b28b5660623e3fbad632cfd5b0cf1c6873b08

      SHA256

      f9070ed49b0a2c10b59a0e688982f6742be74d2872594285eabd1ca2d5012eb0

      SHA512

      434b3bcb2990dd6c5e37cee6fea99ef56602ff2de36455437d76fb5bec92d3867f20e9a669bd7ad3b311ae4448a0203425797918ac3f26b5a73cb5b06529eb6b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0d6e194ed66efe7a0f2918c77f7db0e2

      SHA1

      a1f90591b36d7faf211c912ed7f28300ebf5444e

      SHA256

      9a0bf9b3f73c756fbb667ddff9228971386bb03a1e6c5cb0724757afd2b6a318

      SHA512

      bd17cea832e0720f326c0fccbe6000326bb6430e8ec2ec4964bbe571d0b6c28f1307ec34baee1cb539298804a689322807c51475ff51330b552cee1dadd5911f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c6245a5f8c32832d59908c9f2b16c978

      SHA1

      a0bd48182a688f7fd987e5a3bce0ca160cac7e56

      SHA256

      86b592d14a30f457239972337d1a1edc103262c0297f0dfad1f0954491c63398

      SHA512

      a563c0be3b8c23b2a6e062e6a429a9cd85573c7c6765a55eaf6b8f7ced11720d3f745043c90af8d4ef8290f97a9314d0013de74bff1611e02e5e8020f8c21569

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      460aa67c34781229b8994f44f6b8b641

      SHA1

      d23d5806a9a434b6056353bbf0a16ea036165e26

      SHA256

      f76b5f1bab38adb001214ca3ae699695a4552136774b63fa55b230bdf3d98620

      SHA512

      7eaee475655f55ef6d51cb16de59d98597646dd17d52b158c6666b385b3af30446ddf080d11c48dffbe3ee73c655c4a205faac25348d0160f46115548372991e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      96a755503ce9742bc41bb9a559a468fe

      SHA1

      440bcf89cd348810e2344eefbb2ce205465e14ce

      SHA256

      1675619b029dfa7237646208e5e04c63b049b82c696b480d9cdfb3e41c8df844

      SHA512

      b3acc05ff25bbbd8345a0863d19a6411b22e0a1eb390d2fc46858b973c79ba5fd57598a8711829cb653bc27d860c89da87f344689d083ef5e4da93defb2dbbef

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      dbc5fcbeead58e5f13f93f986d3d8a03

      SHA1

      972efb66349d9c2a2e91d07e32cbc7d0064de96c

      SHA256

      3cc7648c4727a73f20e204c4f556e479603f2778a3dbcea2ae9f9ff0f8ecb3e0

      SHA512

      81e6b793d9a36a7afeddda1e23b8d22c18bf7d012641e8ba1f32c868594bb7ee6416fec4dcb07b444da7d4246b89b300f4016d6502695eb954a531ebe7cedc47

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      47d23924ee358a5c8fe7b889a09272f5

      SHA1

      a4527b1c73f3085074bcb9efc2476421c6455cb8

      SHA256

      596f422e0b5badebdc93c8b805716f1bc818c14e360f859355770df86c141e4c

      SHA512

      5f213236ef73363b84165eaef0fecc6fc77f4997ce1977131a5757f64e0feada14ff0d801333935d3c9a8ff76ffe480a3985c2665543b868e45332530a190615

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      71176af6b1abc044f7078dd08a04e7eb

      SHA1

      87b11c2741bcb45c4ed31971b73c15473558987f

      SHA256

      19600b4f15c0cf2c631294537e57280608b39b54b92cb250c2b1102398662d7e

      SHA512

      96567f31941dc66626fc02e3bc5790d1c64336053712135563b1d753cd25840f25ac8f4aadaaa0b16f4a203fe11e09fdbfe727219b17dc432721c57a82b55488

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c1b8bb2247ed6ebebf6ca83f6da19981

      SHA1

      efbbf61fa44a098ed67a6e3befd0901ba1b8ddec

      SHA256

      312bd82adaab89240168df8a4b8fb05e4fc392ef39e6acf74bd25e7980ea13d1

      SHA512

      c93f485a520744fd5342f105e964ae5ab3ab8a86df030a523a1e2aae9d9d7223fa101cc23079b215ff18b9bec8fc242edaea36135ba99fe6088a12272e524e3f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      781ff91e6acb9a7db3dff9b3e3f8a43f

      SHA1

      2dfb544300d04e0577d3cf8ac5c870fe33b27b17

      SHA256

      ab00d8f4206d447434ee1e88d238587bc598e03f79f3d679838605b4c1879cdd

      SHA512

      c76503eff4608ec22a0ce146812dc544f05e9f52670e584c49a0cc9faed1bfc4b699a0fe118a59f7aec69fe953cfa383fd4923c0f2c7504671e9af29916ce234

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      601ca582f658dd6d29592314d73fdcf0

      SHA1

      7b7a97435f06320dc19189601db8f55ba87e1850

      SHA256

      fa582907f2c2e290a00185d8a809ba251ff2c683472095f20bb1347525d6588a

      SHA512

      55a15fc1932764c9885ea04894720bcc2f282e8cd4aa64aedbfa24eb054a55dfb62eff8655ca74b0a89987b4b48373b2fa25dbf9087701180a5c134484808524

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      52d51e9da087c3604fe88efd7442cab2

      SHA1

      783dbbf124bd663c6007e9dc4b53f45c973fd8ec

      SHA256

      ef845ebacc36516ae6388103894483150b21171fdbd2b616f49beedbba56949f

      SHA512

      dcdd2243cd6e8125a78a0feceb6ec67f6dd0b6efd99a2b9d16c56bbb891b4e0c2fc9fbf3cea38f902d54ccb4591a75a3accc65f60c7233c1de9281d67d181ecb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8237d0074474f441b6688dfb0babf76f

      SHA1

      104e02fa977784a245daa56ad0b63a7ab8a4b58b

      SHA256

      c1f446d2cc318676ef6d76d6a79850128115e131e6f3d524b4c8ebdda82e8cd7

      SHA512

      a461a12395d8671db22ae0f79328ae1d6071a6e955d8040cb947660cc9b8fc5c6b7fc3246e250640eb29921b33bed2c0b5b0c2fa48dae25ac9a098f73e13a7a9

    • C:\Users\Admin\AppData\Local\Temp\Cab713C.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar7604.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1428-484-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1428-490-0x0000000000260000-0x000000000028E000-memory.dmp

      Filesize

      184KB

    • memory/1428-481-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1428-480-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1668-493-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1668-496-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1668-494-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1668-491-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB