Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 03:25

General

  • Target

    4e39705eddb549222ee6b60fb2f18f1c_JaffaCakes118.html

  • Size

    350KB

  • MD5

    4e39705eddb549222ee6b60fb2f18f1c

  • SHA1

    703583f0f449a985de7536b7371736d7517a8344

  • SHA256

    650672ade51ca92757716fe45460f4c55cc45a6c0c746ad649edd8ed40a491e9

  • SHA512

    a580c3dae91e44d9ccb8391653d7a4bcecf4607e22390b848907e632c008a31820dcbe1f99c499ce85d399a7c8895ee2bbffa922b7834483698d4992ad6445de

  • SSDEEP

    6144:SwwhpNTyZjU2E9JMIAPzhsMYod+X3oI+YRGDe1sMYod+X3oI+YRGDev:HwhpNTyZjU2E9JMIAPzt5d+X3vGDG5d2

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:384
      • C:\Windows\system32\services.exe
        C:\Windows\system32\services.exe
        2⤵
          PID:476
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch
            3⤵
              PID:600
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                4⤵
                  PID:1036
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k RPCSS
                3⤵
                  PID:676
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                  3⤵
                    PID:752
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                    3⤵
                      PID:820
                      • C:\Windows\system32\Dwm.exe
                        "C:\Windows\system32\Dwm.exe"
                        4⤵
                          PID:1164
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs
                        3⤵
                          PID:856
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService
                          3⤵
                            PID:972
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k NetworkService
                            3⤵
                              PID:280
                            • C:\Windows\System32\spoolsv.exe
                              C:\Windows\System32\spoolsv.exe
                              3⤵
                                PID:916
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                3⤵
                                  PID:1080
                                • C:\Windows\system32\taskhost.exe
                                  "taskhost.exe"
                                  3⤵
                                    PID:1116
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                    3⤵
                                      PID:2276
                                    • C:\Windows\system32\sppsvc.exe
                                      C:\Windows\system32\sppsvc.exe
                                      3⤵
                                        PID:1992
                                    • C:\Windows\system32\lsass.exe
                                      C:\Windows\system32\lsass.exe
                                      2⤵
                                        PID:492
                                      • C:\Windows\system32\lsm.exe
                                        C:\Windows\system32\lsm.exe
                                        2⤵
                                          PID:500
                                      • C:\Windows\system32\csrss.exe
                                        %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                        1⤵
                                          PID:392
                                        • C:\Windows\system32\winlogon.exe
                                          winlogon.exe
                                          1⤵
                                            PID:432
                                          • C:\Windows\Explorer.EXE
                                            C:\Windows\Explorer.EXE
                                            1⤵
                                              PID:1212
                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e39705eddb549222ee6b60fb2f18f1c_JaffaCakes118.html
                                                2⤵
                                                • Modifies Internet Explorer settings
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:836
                                                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:2
                                                  3⤵
                                                  • Loads dropped DLL
                                                  • Modifies Internet Explorer settings
                                                  • Suspicious use of SetWindowsHookEx
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2112
                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Drops file in Program Files directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious behavior: MapViewOfSection
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2528
                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Drops file in Program Files directory
                                                    PID:2632
                                                    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
                                                      "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1792
                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                        "C:\Program Files\Internet Explorer\iexplore.exe"
                                                        6⤵
                                                          PID:2580
                                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275471 /prefetch:2
                                                    3⤵
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2816

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                a5b7e19ee4bf70eb932febd7caef6487

                                                SHA1

                                                4870f5c5e636098074f89db7f7d98b7a80ada9b5

                                                SHA256

                                                413ff86392b3b3c4b6ade3f8612d198bff2c7178ebc1320f86d3e6dbbb6bc080

                                                SHA512

                                                fc60ea4ae13d27b907c51a074e7b78e0778a1e08b78a17f3b1bea03e731a87b3d4e9bea2a2a506070926c8a0abfc5f8080c3f98fede28ef8e8c9bdd73b024564

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                5172ceea35e2e42d4f364d43c0486c17

                                                SHA1

                                                c77a602513ca70a4da2f5ee46f0b0e3ac3dc1b50

                                                SHA256

                                                e2ac3d10dc0967e1577a2ce4ae5ac5ab298fa76a1e7315cff877b17d1f109c1e

                                                SHA512

                                                d4b26bc26ee8f132126dbe61defdd92f4b658be94edb39769fe665af6159bed2f164149cd3575e5ba8a75f4c439661c5c1b29b716d02131ce9230b100502a0c6

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                b7d47c1999add0f743b800b70930bdbc

                                                SHA1

                                                dfde3648be14e097853c6225fe6beb82a541078d

                                                SHA256

                                                3bf7b2d2ff92a2188be51cca34ed0290bae63dd43f43298af76799a881dd950b

                                                SHA512

                                                d10f72712aac2a8d74567827d832c355c012eaf593ec668cf448e563aed4a2085fb639b231d075460b3d68e5cc14ddefffee4c5a2354982088f01fbc0c99edba

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                fac1bea656dd5b2aa8ed6ff985ba7fd3

                                                SHA1

                                                5e291a9253338bbb0959b7c44f1d29a9d992e129

                                                SHA256

                                                55b2097935fda89efe33d6f4b81fa05650f59cccd96f4ec277f71777d8db020e

                                                SHA512

                                                853beab917f7591b8dc1a588a1c6c9e673074e1cda79bcdb1a11ee7ba76aa03cbbac3f562fdda997cc5161967cf887aff364df6769f493ab104442012bdf56b4

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                bb5fa4edf0850532b5303da70035e02a

                                                SHA1

                                                abfba27aac5cabd108bdfcf172ccd891f7c3e9e0

                                                SHA256

                                                0968cd69d3fa683fca5267be3fcbce1a376ee3ac3e0700c46e9f734035ad2076

                                                SHA512

                                                b666bb7a9a52967e9e3498e516d58d8f0d4b944a56179ff079100ffe062fd29ff026d0fde2a83deb2f403f8a0be70876a6574ca40ddc827834e2531d7eca80d7

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                80cc30add5e0dc129cc3383530770d27

                                                SHA1

                                                801612b7894994c6f3ea9ac75d3e297dfce7f2f5

                                                SHA256

                                                461bbfa41304a7c15254c6edb7f13356edaa30dcab5a0c811b3b60961f12c9d1

                                                SHA512

                                                0a23e314a54d8f9d8ae1c023fbd21c899987d5963dfa2840a7bbf3f491866ab094faf48b743f3a248701ade0a0e5a2da21e3d460e28a7cd1e7a97c7896d91798

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                ffe967ba283c0fd151dbc4530cd3e18c

                                                SHA1

                                                3880b9449d16f6d1e1c71b89ddb5cf9ce653368a

                                                SHA256

                                                f07eea1f96b4f9022980a11edc7a407e836a76bcd8b702842046679800508673

                                                SHA512

                                                ce87630e52f9d63b98f7e2163dfcfeae96514c11807afff65b2d076657d302511d2b6c62b723683fc6f30aea6753cd20af601986332cf1e6283a28f4de9b06eb

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                bae3e18985751c5d85dd6716b2f5a56a

                                                SHA1

                                                33f3c70cfc5e907e34d314e0fc95a4fb47bb2363

                                                SHA256

                                                ce2236a3826fd54e4a6419690a6c0c98bad0b70af610ebc60486372f11da4fca

                                                SHA512

                                                cf4de764c61b9d81743e0805f441c224ea12c89e0eee9a6aa4363b4af7674f1690025c481bb9f1ab5c4e46f948f94433aa0856d368d479ffde3d0b2821acf0de

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                a3bd3facc790ad15ce6b2d119e519040

                                                SHA1

                                                80ca16d93c2a4e3a8480774bb6ed13526878cd22

                                                SHA256

                                                261e8a4d85fd870475e3e7291c8c36b24448e07b634c6dd184ae84171be9a380

                                                SHA512

                                                b44d8421b824877584d615b7e1131f82549d7c0129b41841585530d82de29f066e57f3d88ca97bcb7367aa430c1e4ca8dfe0cb37a701eb7181a8529ede7c712c

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                bd932af3104cd659d1c5457b1c98a8da

                                                SHA1

                                                8ae6e4b40e02f1125c67d5a2a6f3a1ed45209ac2

                                                SHA256

                                                0dea0f284fe6eb75b053abe007c462b54e246e1cb98e0256f0d9de501a075080

                                                SHA512

                                                1bb026ae3e9c72b02f761395cae3324ecfb9e2c0dc839a34ff3a5955a9027eba525c303b89ab0c4bbf321907ee7ebea7e853230a33a0f96925b782cd27f013d9

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                c0241123db52ec371d6f09b016e9f0cd

                                                SHA1

                                                88bc42db18551abaccbb88fe98429884cd52fc05

                                                SHA256

                                                66fd9a9a0ee532634d5ae0078c96a101cc0229270ad3274198ab8f611a91e98a

                                                SHA512

                                                0f5fecf28868fa645fd6f5592011295c44cea324290217545f5b36417215bd45bdb6dd7f6580e9272dcb36ac379b5194fa28be4783720083a1a3908f5d08020d

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                535fe14e59db84181ee655cb01a984c2

                                                SHA1

                                                6ec79e0bf42ffda9b82398f417b75b19ba6e47de

                                                SHA256

                                                bc1f8fe6b2c9c1161e7556b8a5b06de40067a9ceea2c48d233dd272392f1f634

                                                SHA512

                                                ae36b6a27f35a2cca36b799b6d3cba4a9d2256ab08ae2e4301488519d8d3041b2cab01dfb73d923cd9a8d46c10d90c01c69868f452df078fb3fb32f74b0935cd

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                6663f7f5c67ec2a5d6894b0993d3a767

                                                SHA1

                                                3abe86d13557bd1d67447c81970e39468911e3d8

                                                SHA256

                                                885570ba86ad9dd310b8343957e1fd0ede2c5ad58483b895ec0fa9485837436b

                                                SHA512

                                                acc169dd9b115a15c496b9c0ee0c92eb2bf1dc1bcc9867282a2002627c0488cf4ca7784b3f0d9ee57a644552b2335ffee56b8a5154a5a607d1bac1f4c9061a45

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                d419c482b17717a13d4d69b9a3f7005f

                                                SHA1

                                                e7e0435daa2c722d0641736564211c91864d29d6

                                                SHA256

                                                075d32be0f598f7f3002d1638944eb0e24a7affcd5f0c3466300ea56a46154f9

                                                SHA512

                                                35767092b64fc5b0492a84200586b2958d6ad8f5b60dd09b9eb9e500c9a88d37bff2ee65e6745c54fbfc61561e23a62a2d7b4e5df80a345939e6e23ff82f7bb8

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                03422742512123017ba50d169a137561

                                                SHA1

                                                5682129ee39a694ad4dd893f0da5a47f4b7186ff

                                                SHA256

                                                36ded0866cb80ab4bc001caa6653b3d988f05e37f18a723589cc9070a4bdbcbc

                                                SHA512

                                                da4152daa2aa09e8dec1c00396c0eb6004d284cdb88a1cfe2e6a77f620e4e9835b084b5d43ab98e3562d924ea33a89d96bd83b876e3ca0458028eb28e6033a4c

                                              • C:\Users\Admin\AppData\Local\Temp\CabDCD9.tmp

                                                Filesize

                                                68KB

                                                MD5

                                                29f65ba8e88c063813cc50a4ea544e93

                                                SHA1

                                                05a7040d5c127e68c25d81cc51271ffb8bef3568

                                                SHA256

                                                1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                                SHA512

                                                e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                              • C:\Users\Admin\AppData\Local\Temp\TarDD6A.tmp

                                                Filesize

                                                177KB

                                                MD5

                                                435a9ac180383f9fa094131b173a2f7b

                                                SHA1

                                                76944ea657a9db94f9a4bef38f88c46ed4166983

                                                SHA256

                                                67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                                                SHA512

                                                1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                                              • \Users\Admin\AppData\Local\Temp\svchost.exe

                                                Filesize

                                                84KB

                                                MD5

                                                03451dfbff127a5643a1ed613796621d

                                                SHA1

                                                b385005e32bae7c53277783681b3b3e1ac908ec7

                                                SHA256

                                                60c6c49b3a025dbf26a1f4540921908a7ea88367ffc3258caab780b74a09d4fb

                                                SHA512

                                                db7d026781943404b59a3d766cd4c63e0fa3b2abd417c0b283c7bcd9909a8dad75501bd5a5ff8d0f8e5aa803931fc19c66dcaf7f1a5450966511bdaa75df8a89

                                              • memory/1792-27-0x0000000000400000-0x0000000000436000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/1792-25-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2528-21-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2528-28-0x0000000000400000-0x0000000000436000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/2528-13-0x0000000000400000-0x0000000000436000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/2632-15-0x0000000000230000-0x000000000023F000-memory.dmp

                                                Filesize

                                                60KB

                                              • memory/2632-23-0x000000007EFA0000-0x000000007EFAC000-memory.dmp

                                                Filesize

                                                48KB

                                              • memory/2632-14-0x0000000000400000-0x0000000000436000-memory.dmp

                                                Filesize

                                                216KB