Analysis

  • max time kernel
    136s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 07:38

General

  • Target

    4f04e82a0457866b64fac9c9f778f26c_JaffaCakes118.html

  • Size

    125KB

  • MD5

    4f04e82a0457866b64fac9c9f778f26c

  • SHA1

    7228ffd48a47679ca364560fc3ea9ecab70b9890

  • SHA256

    f58a390b3bb7585c80cc09c9e1b358c62a4d5d2fb509415ca65d283b93b55292

  • SHA512

    7d38bd67be4085b6695915437136ffd4c24416cec37b64af44105b66e8d008ce03f4b7f1c1b038133aea7681180196bed6e22d1b3e99b44df18d204d86b5d360

  • SSDEEP

    1536:0H4XyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:0YXyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f04e82a0457866b64fac9c9f778f26c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2512
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2416
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:209930 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2312

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      27b7299ab0666ce277a7ee4fffee6a87

      SHA1

      09cfdbb11252327d8e5b3d639beb7dfd12dec43d

      SHA256

      ace3326890fba1db6f097b03534f12bc3bf39461407935b3af24bda1ef71991f

      SHA512

      a69aaf0965b0aa5a109812b2d4ee470dc1751b3c0c65c86131a31ba55fbe9bf807a87d91d7aa65fe7c53d51b9f5a9a4a8126149ececf7e609d68c5f31eefdae5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b4f16bc1deca6a837a7b76abb381e75b

      SHA1

      55cc99996e2cd3395292c45eb51f2541e125e8cf

      SHA256

      744494bd09c8abc736a51c867124705332a965eab57486cbe7ba32754d29bfae

      SHA512

      b445d2a177482f99a348a626ea7e453e1b1b436478fb18642e5d65c7b000022a2b4351c5eb68adb8a5dd80dce6b7cc06146b662366eb780797df1deea3ffedad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      513c85952b50b2ce6a498173dd747801

      SHA1

      0e5ba7a82615ab602369149bd41c25912de8c59d

      SHA256

      d06534e0f42611764165f683b3ea82356dc59db70bef503630663a52c6a40a86

      SHA512

      11c932feb32cca00f6dc149edc4392026bedd350b906860f56529cd03c6a750676172a0915d7f1a256753dfc55e90de3afd8c1302ddc3f1b467c6d0ae436be86

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1c71aa60f4975a17fc84568cf8fc910f

      SHA1

      596f3ed34a0e8dd683c0826e2f7742180da4b775

      SHA256

      39f2422f5e3ef7ca95f536645d5d88aa35f6a85b6428e831b84cf1b82d48c97e

      SHA512

      2903a2bfcb6694f5540415916d5da1f09914f1a42d4a43fdbb6934209d792aab4e808570e699f1c9ccfcb2a678d950ebedc239e1596c6ab4632083c4acf0c63a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      517f5ae2ab5249e4e81a726a10a49d38

      SHA1

      d2e5bc105e303f64b4006892933e870c0843fbb8

      SHA256

      47179b7625eec4f20829e2601b497464de224f4ee04763543a735185953afe0f

      SHA512

      7888ad4c9fdb99c00195f11a72f6980abe2d6fcb52a0139af88a3e5d48ec076fb843256f02608a0a948d97e0f909f050767d10d1771267d93f383684b4bf1add

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      83476f923a1414ec83050789db20bd38

      SHA1

      5fe420284ffd716507102399c9b6753c999e2cdd

      SHA256

      1ba2de3a7a7d8f382a1fd6ebe7ada1e5394f15f98eef654076dba2872c63766d

      SHA512

      a7ce3b6e110e06f9ba796aa64d872357e2c6df029ae8717936a83312de009c5e65d9729481d4f7565e159f8ce3fee60fd12dbf25c6861a775e1ba0fddc4c4da7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5e24f6abeba0cb27b93ccfc6f30e31d0

      SHA1

      cee088396d138f65ede876d8a4c347b492e8e156

      SHA256

      743db12970b7c1b599cbd4a231ccc72081a5fc621e296574ef2469e8e74158a8

      SHA512

      1b7cba14a9aa5a1d2bfb5d8e30ed54db4ef5fb42aee51b99b512db2f92ab68e8017198ab8aef6870d3ed7f719f278433ce46f5f54d3d05237b4043669070627a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7a8d0cbca7a1d4f33c4278358a442251

      SHA1

      2b6697e40c74c7e5bbfeb59a393a862baef34c5b

      SHA256

      f6a09056eace223a318a3f27ac2ec389be52a9f804011b1d287766126839d549

      SHA512

      8b18b9fb996047c18abce1cb4d1d4e24d8cdeadf8820847bce73cac27e21eb58a06863ddd8b63a019b8551adc21f9421062ca5ded773479ecd36412fe577c983

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6ac75c778f963100b8ffc1bb2f3e46d7

      SHA1

      198d1a3f365205c3e5fa80306174442a1e3d0e7f

      SHA256

      f4241836a11a5cac6b0115ee06fab20f123138c251ddcdc437bb4f47ee39a737

      SHA512

      a49aace5e501037e8f503952150d78ad80868e6b2292410bb5b31ff2f97968adb453dfb1355df352cf49f86f8a7fa940154d129a261962ab8abf7bf50ccb14ba

    • C:\Users\Admin\AppData\Local\Temp\Cab317E.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar327F.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2512-19-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2512-21-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2512-18-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2512-16-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2680-10-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2680-9-0x0000000000240000-0x000000000024F000-memory.dmp

      Filesize

      60KB

    • memory/2680-6-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB