Analysis

  • max time kernel
    137s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    19/05/2024, 19:24

General

  • Target

    5b0c9a16899c6bbc97ac39700c222464_JaffaCakes118.html

  • Size

    470KB

  • MD5

    5b0c9a16899c6bbc97ac39700c222464

  • SHA1

    d37da4fc2ecf0cd50174f2a895a46bbbe82a3f9c

  • SHA256

    e0ca52c8a69e0788752e2ee714d57af0ca12207147d204e5c4324a4402138618

  • SHA512

    935fa5371498d929874e2e67432fc53dea2075f3ebd4d6ecbb0bf6ccf3614de34dd65096e0cbeddbad562596930971ba99dfe65068bb1c90cc6e4901d784c011

  • SSDEEP

    6144:S5gsMYod+X3oI+Y6tvu6xAmzM86P5sZpMFzBtug4r1GcFBU/b:YO5d+X3poCPuzmrugwG2qz

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b0c9a16899c6bbc97ac39700c222464_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1868
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:916
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:312
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275470 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1672

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fe8d75e20072d077bfd7e7b919c56ab2

      SHA1

      25b6aefb62ae9859c26b35d1d40e6aad71c061a4

      SHA256

      ffcc178e92a0956a874d78cec5436a32e69ed4a6735a1cc0d494d10a55f0c7d9

      SHA512

      fc2dfe92c4a1cea9453369dc7548d7f5b8f1dffbf07fb545f1b6c031709a7202155c15dc4dd68108f81ec0e187fa62bda42c6cee000b9d5f8a51cb95017bb4d9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      29084a6b76bfbabb759ec2f8f6dfb99e

      SHA1

      4ec67c9c534ecb0623f21d18eec5a1311bd2a68f

      SHA256

      c381246a2cdd1739fdaf85555d69e49471f7c353878dd87d1a3c700cbbd9858c

      SHA512

      da0c83453a1956fc81c5d72813157a3b28453c779f30bfea11937ad4ad72eb1ebb5b87aea61ca1604b6a074add5e07f6115c59c4bded562df8a1a95049616b44

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8daf60a6c6cc552e8818390443ce39df

      SHA1

      6d01611aad3e9f262b047dd6982319920f8903dd

      SHA256

      320af5f1a225ad127ba251c208e5d99580402a4f5428b5d12053b81eaf350a05

      SHA512

      27905ee956e9b9c37fd4efe87e6af6f135a1bf83b6369ca7c3b953d33257b8c54994218f687fb22d2ec4243799e35c5e29f676ecdafa3f0015379ee7fab96b82

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      38434102571714bbff63578d0cec7d2b

      SHA1

      eed66a79181c30acd4350533c07a5c55b91ec51f

      SHA256

      cbc67ace9e2d219ef1c4dd50c9ca2fbe709da07e3208e6ae522e2b549f79d6cb

      SHA512

      a8dfce5db2d91054af68d6da998c25b89e00324a6fa52c4f9b5f2bb67633138a5093c5ecc7e3ff7271a190ed732bbcbd0e94451a65ededc75546a4fb57d3e8a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a781701956d4c2a49aac0d3b41bf8676

      SHA1

      600104473608c2921060bebfdc561d9fefe5c226

      SHA256

      4e137c694a8cc785f0ce4112ba0f35b22ac71d50dd17986bf760f83e704e8280

      SHA512

      4bbcd0eaf1f62f0dc8d10734b02bef0326f73f23e34872fabddb57b8659059c6154eebb62f771f58f12c1ec9d06bcd07c198830e22cf2fad5f2d5d92a57a7e74

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e9929c8fbb09886770ac1bca1e120e7b

      SHA1

      ce5fc39aeb3d37752e1ffcd9891a6f4ebc434597

      SHA256

      d095247f0f72048e81e21750cfbda481401ab839af909150ba9bee82a1367608

      SHA512

      abc7aae94b7093d87867ed2bf9f7975cbc188e0d77049ec1fbdb6ced3217e35e54f974871c94f595eb6dadaf332f1d1f6995e853f08ddb301405f53ea335906f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d4ac3bfc03375fedf77ed72e388b92d8

      SHA1

      93fcd0b0700f3b127774bd132863b4a4f1911943

      SHA256

      4bf62a8383436c73e8a88227120c4ffd2529e6ec6871abb6181385489a542966

      SHA512

      e2429f6a89062373d0dab410326d3384d9d92a8ae711a703dca22528c7919074f8d565c9ccc93f6cae556af7b82d6a8d3acfe5a41302cba65495d0458a025e22

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      034d39e8bb58f83e5ddb50cb7c4a69cd

      SHA1

      c897ce565b022fbed857dfc409a7339ec63b21bf

      SHA256

      07b5502ba762fed908ca257cd71706b8171956689a1ec619d70bc100b7227694

      SHA512

      419df7091cc490cfa5ddd085a3357e63b77cef43399771e883d291301e8a8ca2a219928efb198aea27543ce63b5ed2dfec5d109dfcf467c105630d282599fb89

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      aefe47db64e44b1a54e5aaa8c925fc57

      SHA1

      6e4cf46d0c0fff7c59efb425ad76b15aa7e40466

      SHA256

      2e5458cb91c5dc210040462bfd2cdf181a4a7872faea5c5deda3aac2f5c22d3c

      SHA512

      dc5bed2041fdc4c0f7a5555c6151886b536a03aa9bea400a3791caa803f8ed19597a3b5a2fb3f4ec37bfa57dfe89d36acc747feccf701fa99cc52bb7a51b11a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ba2fedcb37c7b295ea164a95cad300cc

      SHA1

      aab66e6c24520a051a43ccd442edf4aa5dd04532

      SHA256

      efc5078dfdfd8c45d61658822d9e876f273d0d98b51220758515a031f96e1604

      SHA512

      77f35ce45df0cafa7ae27d79fd7c853c3928ea5c87002af7669700b710efb86eabb22e3d8ee8e5023beb91810c78aeb42dc293c1ac822b685facb0218fa14eae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      38dda8b80ac373ad59b32594b3d064f1

      SHA1

      4ec59280096281db0fc8b6ffca211303061a1b12

      SHA256

      a26712c90a5c8f842067b6caedefd7517390d0da5339022fb168135a72ffa175

      SHA512

      31d61bd0f78d260b40aecd1db5043d4f975f1e761a9790e46ffef052d9ce0eb523a9bbda9aff0e05cbfd5150a63af2dc504b020779169334d4f1fbef92bf1a37

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      20bf93bdc8559e2b65ae0dc1d728f7c5

      SHA1

      0b03c4c704de6e82c8cf7b3698507fcf74316371

      SHA256

      a9fe0983f77bd1307d2eb608c97b9421b18b7f4da14fa0f481dfd22ac91277ba

      SHA512

      559ddaa97a1b0f062e4478b6bb0a5401dfada970d2080d3315c3b2076a384c3895583cdf658ebad655f0477be3db9b9ba99490758d5bf39824a6a01e457eb201

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      110c4f53b971ab44a4e83a1733d8930d

      SHA1

      ed81f14ba21ec02cb7b4dc00ec911b532002a169

      SHA256

      af7fcaa0700976185f89c1d218bb35037da042493bd030aa1e4eddc1e63bf2b2

      SHA512

      89b7400132c671251ff9f90de7c90ee71bcebe5ddd45e826195935e082edfeff18ac802a432b6879d328f47ee06cbf4e4217fa580f1b45f174e992af18b80ea6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b78cbe32f81061c40699c658455131b0

      SHA1

      358e620c0ac748f7e2f9694c78970478b4194571

      SHA256

      f685844c5b02e186f3bd3f97e5b56ae0c4834a3b1913f105d2ee788a58427b12

      SHA512

      d1592cc44c2f2451ca1c852814a9f8149c61a77dbaac05f8c50035062fc04cac1b5f8e91bfc8499e7add22185002af83f6ad9a84a9e8b651a58566190920ab86

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      82604aeb9d106557bc55ee2906fa5875

      SHA1

      06e000959c5b32db5b5386ece8bf2c29854b9a09

      SHA256

      da49a6762295906e230b2660a13d60834918814516b822e95dfe57d201c98132

      SHA512

      c1d3d2c855e2baafbdfee70932728d654af350e9408594d01927227091d26f4d79c0052c27ce1567b0b27752c087f07ed37a24ddc2dad66ced8c4675d24c2024

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      94dcf464154a341fe4f7807fe64c3ba0

      SHA1

      233727536a5719d0b24fff1f3f619fe75808d164

      SHA256

      702121586f0041cb58e7fea9765158cafdefeaf07a519d9f50cc1c9686a1e2c2

      SHA512

      774d9d749d8e057f4d9b39ab07266d756d9f979ae9b1087ccf397feb5c95c6bc603091e566cf719d369134939f95073dadc606a790d65117c6a4080ccf05fd89

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      517d68646c3196c52fa5a8a88bec856d

      SHA1

      dd278909422562ae644a58d265946f5df2a25ed2

      SHA256

      3f687f0a5c8e5e671dbd3b2b092bbc022dee349097ffd5ab1aef38b4d2a8b7b8

      SHA512

      02376aa7a179599bbabceb9b2f70dba2c014740296a2c103933c3fd57ff3d4b8d5843dc022a34e71e955eb10ad743d9419c67fa552032890ec780103e46fbf42

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      80470e701282e98f7f9012463f9bef42

      SHA1

      2f95392bafb39ba6cba78fa51eb902f8579c9e97

      SHA256

      4f3a99432b0724f45fe362003c508fcaa1e89f64f9fb3298715c173eb6031c8a

      SHA512

      eb0e16c96a2b655ad9681b0439a888c4a93178f4272e7117aa1c815cc3bf4ee39999fa80d64a9ba49544437fa5e8339099240ec664f406e6cb11195e094ff3d5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a93ca58bd6235840d668978a268cb378

      SHA1

      4d8d113114f63d3229ff77e741b26c11612a3ed5

      SHA256

      4ae173760c76ef691c1ac55011d025cdca24ebf8d2d9b5d174ecb62f65a6c360

      SHA512

      34b47cf493c2e93724d0accc9ebdbb70bc85839a56b93bc731f1bfa3168bfa78247859f7b7cc0be2ebebab20448b9d6c2f232fbfb571561577cfb9ec9984e348

    • C:\Users\Admin\AppData\Local\Temp\Cab1113.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar11F4.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      228KB

      MD5

      e9c85c499f6b7c7e91a44567f27ecd68

      SHA1

      6f89d9176e58f04c3cd48669f7a0b83660642379

      SHA256

      f09ec41136e8e5e5076ca495192d9326e5581c748148fa877412d466db26112d

      SHA512

      dd40f713857e9c574e5d34dd292d17fbb94a38c1f1d7f2cf90e043b713c42358d74327e403d3617f5985fbafd35d90c24fbfbeb97cd95a02224a24d75396a5e5

    • \Users\Admin\AppData\Local\Temp\wrlB3E4.tmp

      Filesize

      172KB

      MD5

      685f1cbd4af30a1d0c25f252d399a666

      SHA1

      6a1b978f5e6150b88c8634146f1406ed97d2f134

      SHA256

      0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

      SHA512

      6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

    • memory/916-508-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/916-509-0x0000000000230000-0x00000000002A3000-memory.dmp

      Filesize

      460KB

    • memory/916-505-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/916-503-0x0000000000230000-0x00000000002A3000-memory.dmp

      Filesize

      460KB

    • memory/916-504-0x00000000002F0000-0x00000000002F1000-memory.dmp

      Filesize

      4KB

    • memory/916-496-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1868-495-0x00000000002C0000-0x0000000000333000-memory.dmp

      Filesize

      460KB

    • memory/1868-486-0x0000000000360000-0x000000000036F000-memory.dmp

      Filesize

      60KB

    • memory/1868-487-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1868-485-0x00000000002C0000-0x0000000000333000-memory.dmp

      Filesize

      460KB

    • memory/1868-482-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB