Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 14:20

General

  • Target

    4b8378ba0b75c6676b80288f26e6881e_JaffaCakes118.html

  • Size

    157KB

  • MD5

    4b8378ba0b75c6676b80288f26e6881e

  • SHA1

    228ca409b26c40d613e27ac68b39921542ee5cff

  • SHA256

    1759462569213bab2a543cb7aad75b9d2da41544d3160ac1b428fe572c4d6762

  • SHA512

    72f3b8df10322831877e35836f08b6864c242dfa0e2adbaa6316cba4b267d0a59d9e81778214be289bbb3563145152651c03dcac277d93c6f135a5058c2ceeb2

  • SSDEEP

    1536:iQRT3esx9buyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:i6Z1uyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b8378ba0b75c6676b80288f26e6881e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1824
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1080
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:406539 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      982dc73fe56fb95dc1b66f89c3d8cda2

      SHA1

      ad9f183ce78471d46f12af44e870590e1b7cf669

      SHA256

      1088f1a5003244b5e420dce87b06bafa19bd2f70dbc7fa3210d731f9c08a68d8

      SHA512

      8564ca646b5fa22904701961cebd54f60d59245bf26cbd834e967cc157ed3f36fb774a5c7587739533f2fa49e8a16463b10cfad174f4497c4c2b2069c5efc8f5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f2f085538ddd7221f4c284032d71ad51

      SHA1

      d4daf514929eb989b2c7e7e8705f818fa9e6ba20

      SHA256

      84f75a589c0b7c42f33854ad26e550f4c9cc67f9056da831a21d12b11e2bd2eb

      SHA512

      c12922e6be4041486a42962f2ec5bd03dcf9927a61c4e69e47b2e2c2aa5dbdea81a1c85d519e4a6ce1e1704386d624d79f0d2044a75e3973d4ebfccd66c70033

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c6fb51a984c6a0147cfef53bc86ce6f8

      SHA1

      3c607c19202e192a409c638ab605cc3fd7730a1a

      SHA256

      fc40b7f7fb761a5523780f121e055dbd3e6cf1c316c2bee86f92fc3773b27a4c

      SHA512

      fd20f7f23a73e463a63233a9d059d48ed62b1a393caa339c54fbe5eb4b1937927d04e5afb3df507be9cb2a872db8402b8f5e2e1879b1bb4983357295a76097fb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9a8b89c2e42f942464eeba3a19b1919e

      SHA1

      94acde6b62d9eb0b0d91a3e6e45791ca1d0adb82

      SHA256

      ae4631f5c0655f0723ccd108455842bb8e1e00520082ebf9347b3f079806c5b3

      SHA512

      3ec5b120b16f3dc26c34a54ca52d0cc7553fe5cae8fdd847edef38672fc31ea8d3480da40acafb5ce7c0505dcef3b0c418d919a48d4c13ad05fae5a19c7bc523

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a30f787915226d42753ffd2855d16932

      SHA1

      cc01d3bb4dfac85ad88bf1be2c462cfced27cd72

      SHA256

      d8610a24393ec7760241708f8aa54ca755c56dfedf3cdb7840179a29ade285da

      SHA512

      356dda05abcb2f2d8e6504d8dc334bf79d11803a1a903dfb27378174b71755daf6325c8e238f43d26f4835d5006eb88c1ccb2772ae5ecf287896c491b965ca36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d3c6359890e085ab3eb86a58a68fd8d5

      SHA1

      8215d8548b8ba627b401c508f00cea02ca016339

      SHA256

      b09d491e540255855139175f1976ccf63af9653705d433f96cb5927e7daf2cb8

      SHA512

      dd733ca9ff6bb52fc5605431d297f4b9840101dd0935819e628fd37aac86ca248a8f78eb114fab20d830ac19104efa6d8a96f3c6d1b76f1e3f2f45a023c77fa9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4af346d8dd401cf3d365c3073be643a0

      SHA1

      a64cea47178caf1ff944510905f27c1e042b8a90

      SHA256

      afddc08991629b21c9e6c3b01e66a250d144166a630b24971c9d015452f533db

      SHA512

      3580104c4f14d3d90ebd5a3b79e54927169bf73afbe4291172506a2d11d3f64be758e2c860a131806c12db9bb5fdc08b725997f66c142f0619396e6ad63c6ab4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ae1bcdfadd3f37edc39f6eb367b49d61

      SHA1

      6a0775bda7ce24df7bcbeb7a772e81ef506b5d99

      SHA256

      9d5a014794b619eaa07239f099c9ce41d05be7ff8e90a04092edeb9b5d4e5d1b

      SHA512

      179f3e8cf9cdb117d620ffd66b0afb42f04f3fa2b6b2119f7ee380774890eedc60046fdeae47601548ea876c46bf56d5fbdc1e36117c82154903f0081c688ce9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4b0c6435ca5198fdb14b9cbec5defb7b

      SHA1

      8028314907a10c92de12c0217d06376e0bb15927

      SHA256

      06966ae80e436f0ea13648d07fc2607aef575d95fbe35559bb2609be8ad5adff

      SHA512

      db9d3061f65246f3ec4f1494cf3f6dae3d88061151642da1fefa7ca67da572de328d25668f59b77c06b92e87214a4d1ab9f88b613c46eff4d71bed32582976a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c5367aef2cbb18e16f8443227899986a

      SHA1

      dea21d9212473d06ae9a8b465c4e29e9b65dcd7d

      SHA256

      7b9757dfc9b6c8049c717a9b8b539ed154bf0edfe4814ad22652fc81acea2108

      SHA512

      29441ad3718ae97963563fd1a504fb1a4d34dcc4b3d57dff77c2e8ff0a1bfd31e9224b2b6f6576c514d232cef690c313a8d68331caafaac0b350aadeee5eca12

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f63a27cf0e0f2f1094fabedb0da49123

      SHA1

      66104f2245691f3681b0651a663549c42d3beb44

      SHA256

      03a0b3621225aaf5a4aa4bce254ff5ef55fca4d0de5c352b515316b24d5daa9b

      SHA512

      0af11507ab7a4172ab8b76366f91add6a67d1bb351bb1700ddc9ab26fe9d51a4aec8c4f534f8b3befe5c05e5b8020c59a58b046c43e98f385170a497ed876560

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0e60be299e2348e3abeb9fff53113930

      SHA1

      1e4d47a2720b51e262be009a36873032ac9cecb3

      SHA256

      3caf37c835f80a57fca6e82f8c87fbf95a36746baf5142e5b2d1bc97aee33e77

      SHA512

      148061a1ceac56932b641a8eab45d8e59e59b8488d17537f4aa7734e2837e395b43b048f997155d590afc6c8f85147480a53843618e7347966c889d502ef4577

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8c24bbbf82db70ed9e27a20603c7317f

      SHA1

      61a6d37bd8ad1206d04d0c9a85adeacaad45c956

      SHA256

      b09e6ad4f4e7bf83272e6e0d03016d15f590c1125b4a6c1c8580e9a22a24d6ef

      SHA512

      696c005e3351f85d0d9ae2148c771ec394492160b3fdf6b646a6b896bfca44523ec43884c37b29e30fb7119ee36b00ecfb92900bb5640a3c7b1bf2e2e2895856

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c81bc7d805473b40883e303965d5c042

      SHA1

      46f36345965000e3f6646722dce21a786285f587

      SHA256

      09a6220ecbbf79a6dd3a610f79db885665225dbc3ba1696d060a50e9b108c40d

      SHA512

      c837575f6dead463bda0e8532dde8528edaed1554a30c4ca89600113cf8af44a2afddb97f0ae1aa839a4252767c0cc7560541b3ad082e38a156443795c9e2168

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      61476e3653d59ab141bc1595cbd29063

      SHA1

      bbca9de1a0ea37390386e148793e11a961c459a5

      SHA256

      3cb8cd6d644640b7c81ecb7b66472583ca99d526ea5aaafcf9eb1e549b5bec11

      SHA512

      ae9de994ad1d7b66dba1d2fdd362849ef2e84bb3750428fdbdba41b6fb888a4f44b4931f7d22b4d139f92bd1828afa494ce7fcf1e4dd2c51ad39038f3a945819

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f706ba9a90c5d120a4eead5f83231bae

      SHA1

      c844feebc46a895016a9400fba760a5e06dca51f

      SHA256

      6aa8feb3034b3ef9d83a94b07b3c87386290ea1fa93526446b4f393ee325ec74

      SHA512

      c790b01301898cdc26dd718d05e3be2e83792a8da4b5d535f4ec4b30f0d7a7a3263897a9b964845700caa0c87905decafe5450752ddee273a9d2f090709e3020

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3e1251a9020b3e7a323b40950469b4d8

      SHA1

      d96789214f64200c8e858d0321efc96a0d4e4243

      SHA256

      63a99f8da325011bd68b1f31f7ed4f41b738e19e5137a8a57fe48280e1d0d979

      SHA512

      db4639e575baea7e8874b87a3c6a9c373de9e89e4cf22b52b3aa1aadc7da45beccae0b10a0fcd56d10ed0537dd7b7c1aa89a3fb952ee7afb68a454c3a2fd7be2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bc5035714f6263bc405ec9a93aed1a0c

      SHA1

      fd733d0be388e54677ebb6cc4936520aa7bbb3e2

      SHA256

      27c874f550407e264ff6ec5b8b55eaadd892afba2d762ab782c7d963d6c89e19

      SHA512

      89d45105f74087fac69a7127ef1b80491a432f24cd5c640e1de3d7bba4431d1e9b615b91a1c35db08b23079e2a86fb741041dfb61863410daa5ee3b9c837c8fc

    • C:\Users\Admin\AppData\Local\Temp\Cab1AB4.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar1B24.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1044-438-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1044-435-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1044-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1824-445-0x00000000003D0000-0x00000000003D1000-memory.dmp

      Filesize

      4KB

    • memory/1824-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB