Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 01:47

General

  • Target

    440aeed43da160cdf1f6926088f7b1eb_JaffaCakes118.html

  • Size

    247KB

  • MD5

    440aeed43da160cdf1f6926088f7b1eb

  • SHA1

    005e059215d9d755cc163cd52aa08dd0d1169fc1

  • SHA256

    adab2af850e23651f9cae7884c7e71544f077549d44ebd27d43fac74d0ccef72

  • SHA512

    38ace268d0f4050ebd579314d5ab6d3de5cc06a020b8a4347660bf24cd3c3135d364373de95845f89099dda1fa224e2eae72e3bb56b439d682962238659ad176

  • SSDEEP

    3072:BZb24yfkMY+BES09JXAnyrZalI+YO+yfkMY+BES09JXAnyrZalI+Ye:esMYod+X3oI+YObsMYod+X3oI+Ye

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\440aeed43da160cdf1f6926088f7b1eb_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2360
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2456
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2432
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2848
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:209933 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2528
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:209937 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1012

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

              Filesize

              717B

              MD5

              822467b728b7a66b081c91795373789a

              SHA1

              d8f2f02e1eef62485a9feffd59ce837511749865

              SHA256

              af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

              SHA512

              bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

              Filesize

              914B

              MD5

              e4a68ac854ac5242460afd72481b2a44

              SHA1

              df3c24f9bfd666761b268073fe06d1cc8d4f82a4

              SHA256

              cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

              SHA512

              5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

              Filesize

              1KB

              MD5

              a266bb7dcc38a562631361bbf61dd11b

              SHA1

              3b1efd3a66ea28b16697394703a72ca340a05bd5

              SHA256

              df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

              SHA512

              0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

              Filesize

              192B

              MD5

              1be8ee40169482c7c513e31a214cbd16

              SHA1

              f05029ad88dadc37b3284ce2d8df5d2273eb9082

              SHA256

              a034055459636a06b8e96ed742e016ec945c5b774eb2568ffe09f6f14d032386

              SHA512

              aab67869f0fffde144d1e05d503cd6f3eb5adca42c2cc1990698513ece5f88cde9e415433cbf1a3a69b690fe70d4f2668aab21fd0ec4718b1e44577b34708766

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

              Filesize

              252B

              MD5

              8a0e5f3c4d61efa0e4925b4eb028f952

              SHA1

              47a8bf10d2b2b69f1affe18676ca2c89c8749dc2

              SHA256

              a16fff8bae2aefb5f9da27a6ce7035b264306c415550b50d620c6fc29d562312

              SHA512

              e255a34d124cf2976e8dcdd76945ca457ee4a6bffe7afb016c1f15d935dabdd10606eb4b693b2e98a43d306e34b272f903bdbcc0943845df79b91c736956faf3

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              e1afac09c2668069f5f96ae068433aeb

              SHA1

              a9f101c42b4903ba160ebf841b872ccb7726de33

              SHA256

              0603206a45c90eeca27c1d8ce3d3568900924871674bf63cb809daa1dedba99e

              SHA512

              aaa4f400d5ad38daa0cdee6e4c1b4fce469304cfaa19bcb7aa9ec0063e75295b7652d7cd8414bae4d19d6c492d80b0fa0579189f4e198c1262dbcb3b753fb0f3

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              5e858926225a9addc08e695ad59ba321

              SHA1

              098ecaeea6660cdfbb14b7e8305213bdb22e0ae9

              SHA256

              d9010496ed875083c2b1a17337fa3bc57e01ef24ed6efcc09d99105f24990ad2

              SHA512

              841ab530ef789e53650227d3090c4d86c54842a97ceb5f01c2a99a32bb459b49ffc369a7f4fa8d92585cc9c728f3f9c22345ae60a8b646bf6051468e59c8b2a4

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              9df9af47525889370a6154e0e5314138

              SHA1

              18344f8436a3a734800ac7d1b04930e78e45c3a3

              SHA256

              54a2deb2f8567aaeed699034982ba7d107e358558b302be94b47c85ef4cc2942

              SHA512

              f06131a43e66d815ee9983582705d147852edfcc3c289fcf880fd631729f951abf682761ee2a18f44b733c3c1c73c9b435e4251486761988bc1006d2e3f3a113

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              da93046156e699026588580b5e5b899d

              SHA1

              22c68bd20ee4c01e78ca28d098ceef429ff62b10

              SHA256

              cdaf0659b92ad95e920295d152b9aa858eb1fdb89351bbd061bdeb9df864e88a

              SHA512

              196948853823430e683a93835c0b1637fca54c89861292cd5f163d8a5cfd2b9f0bc9446f20ba5d5bc592179d39ea27669003e2bc11ffd1c256126bb9b5d3b791

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              7c740c782910281c967133e2cc7743c1

              SHA1

              4d6ddfe5f7896ff609a87b5f6542a0b255abc160

              SHA256

              b6e08c7ceca93c76636ed3329a8c7f0af6e3aaa88e3f6bbca4e599b5448b6e01

              SHA512

              33106903e510fb859cde2ce57228eeeb4b70abc33cae4b34363be8543af951460a7482390ab37f94244b68e1760f68e4ca6cfb8ad4558cc84e0d41443377cd11

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              48ad80b6673f11680fabe5ec4d2c8e9d

              SHA1

              51c0fdaf3086541c4741c8857da69a510e44044a

              SHA256

              d7e82a7e651ed45cd7d2120bab5a3f7fa6f166bcb06c89a7c336d4c5bc77564f

              SHA512

              07a43636e682691a0b63ab0010379d8a3e843ee052c87bd6ec100affc3cb7e0561d2354fe5972d6a5a2a970aa1dc7ab1afba24aa7656dd6c8b909c8e00b61446

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              26c2fb4b769d010619d5963eb09b3907

              SHA1

              31142d5913c8e84b0375332b77d44294e76bba20

              SHA256

              2f22552bb79c85194770d67dcf0f5820e345d9b87f4e2945c73f005b10e68418

              SHA512

              205184b4329e118d2c66d6d2d05ef7cb3a16380db790446823a23d44ec5e246b382b28376146432868151f32559d83aa76f9b5b77f8b3b676ac442274fe8c38e

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              46291cffe9dd70b5f9bd6357de5d6a93

              SHA1

              0db6e5d9555cb6ce1d2aa9e5e81b54e01a3aaead

              SHA256

              7b1ff1270e4a5826e014300fa97f138099410dd7ed24ac74c9729c107d308f2e

              SHA512

              e5d6d92b83ebcfe0b3fb63de978fc1a35af02b47de9681b17f33b783c4e76b82fcfc7910e00a82f044c732b4ffed486b465c19a6034e501064160a7247a82e0b

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              a9033a853d0819ae187a91d04e625412

              SHA1

              ff81db4e2f656e6cd2b21fa7666c8d692321f7e0

              SHA256

              9886ed79baec4a2a40a21ce2f03bcfeabcedd905d35939ac1d99ea63bc4b68f9

              SHA512

              f317a948207acd52c9ffcd749676f055f9852e10a6b6fea6152d4fae27d11fcfda9124fc3feb737d9a0e7b07015b791717128e700faff3c5aadc0c098c41e6e2

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              2de8a7891c4789b3f46e1c3c6b28844c

              SHA1

              4a9c3448bdbd9630f8eed63e93e3774c8cf35928

              SHA256

              bbfd0b8620dfb776a70ee139f1809416ff719b3c7966ef2c5148473cdc4d5865

              SHA512

              7e81d5afced1d3244486d5b0b4a25e873915dd5ea263ccdcd11a0b95128d7145184812d0c031d7eca5a8518721e2e89a22769f7bee72c820d7d0c4ae6f88e0ef

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              b0a282e88f40ab65666f6a20b064a764

              SHA1

              b25e55680eff21fc6e418a5086ae7d8d34d29018

              SHA256

              8bde72d87cdb40da12cccba9ccc7af0ca5cd1946ac49e731526c8e291a73d70e

              SHA512

              82750c778fa4e8da445522db356808d76139a5e2127ca31c1b2f6316f1e5069887d7a189f32d253ce21da4f22434379da1af6457786dd0a2d5cfa128c6ba1ee2

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

              Filesize

              242B

              MD5

              88b70c10c20dcee53920001d244f9883

              SHA1

              b05880f2c34374b8da36d5e03fb90589b3822d18

              SHA256

              ba098864242462a2f11b7dc6f58252d3b39890e38aa1850186dd753f08a5afe7

              SHA512

              aa5e3084307521b1d3e5c8f63d9fba88f71b8058499bb0a654bf72b726c0bb51c919813e59eee76e43eea3ee4b0395da3025ac21dcb4c075200e3b55be540a5f

            • C:\Users\Admin\AppData\Local\Temp\Cab31CD.tmp

              Filesize

              65KB

              MD5

              ac05d27423a85adc1622c714f2cb6184

              SHA1

              b0fe2b1abddb97837ea0195be70ab2ff14d43198

              SHA256

              c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

              SHA512

              6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

            • C:\Users\Admin\AppData\Local\Temp\Cab3357.tmp

              Filesize

              68KB

              MD5

              29f65ba8e88c063813cc50a4ea544e93

              SHA1

              05a7040d5c127e68c25d81cc51271ffb8bef3568

              SHA256

              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

              SHA512

              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

            • C:\Users\Admin\AppData\Local\Temp\Tar31CE.tmp

              Filesize

              171KB

              MD5

              9c0c641c06238516f27941aa1166d427

              SHA1

              64cd549fb8cf014fcd9312aa7a5b023847b6c977

              SHA256

              4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

              SHA512

              936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

            • C:\Users\Admin\AppData\Local\Temp\Tar3399.tmp

              Filesize

              177KB

              MD5

              435a9ac180383f9fa094131b173a2f7b

              SHA1

              76944ea657a9db94f9a4bef38f88c46ed4166983

              SHA256

              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

              SHA512

              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

            • \Users\Admin\AppData\Local\Temp\svchost.exe

              Filesize

              55KB

              MD5

              ff5e1f27193ce51eec318714ef038bef

              SHA1

              b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

              SHA256

              fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

              SHA512

              c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

            • memory/2360-20-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2360-18-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/2360-16-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2432-26-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2432-23-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2508-13-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2508-14-0x00000000002D0000-0x00000000002FE000-memory.dmp

              Filesize

              184KB

            • memory/2508-6-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB