Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 21:12

General

  • Target

    64c8283f7f7a03ab10be27d39f4b91e0_JaffaCakes118.html

  • Size

    158KB

  • MD5

    64c8283f7f7a03ab10be27d39f4b91e0

  • SHA1

    4efa8c00c4af59897398451c0940b3bd3784b32d

  • SHA256

    9bf428e6b1267ee1d26e301dbe241a3b42085808f1edb770313a59eeba46a478

  • SHA512

    7b4032c21ef3082b64cd063d370852fd7ae2ca262ced10d2de04b4c6f35d6d45bb8b2cfb6227e2fb589d19dcd6acf19a719b84e6546834948f142f4cb1c5b122

  • SSDEEP

    3072:iax1voOwhbyfkMY+BES09JXAnyrZalI+YQ:iea+sMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64c8283f7f7a03ab10be27d39f4b91e0_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2292
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1664
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:472080 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      c20a3613c1a5d3ec8e340c9e0f691263

      SHA1

      1e028d93fad27e7ba48970561275d3638d54e87f

      SHA256

      399d1109c6fff8ff76e57f4d9940de9a821723e4370d50faf49ecf590961a245

      SHA512

      05d90f2d7b6c44ca6829dfc3bfcd27bc7e5f00a7393aa49d44bd2a1d3d6fefc76937a1b2421b24d25959ff53297a0daf3d337bc2549d5036139dcb8dda49d93e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      aa7a36186f3127d94971aa4aaaff419a

      SHA1

      5078f5be5919edacbe250a0d2029ac7db3e55881

      SHA256

      ac6ae42fe4d8de9bdc1174b5a65ec81bb07749d19aea906893e9383d6a51af77

      SHA512

      8760cba1ea0e9fb0ba6bc1083d8fbbd78e7338dfa6db2067989054d6548f5f8488196f2e6409326b811be784446ab01700bdf6f9989403a117e729e29354f44b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      33d36097e2b772bc1b9b1f04965d40ba

      SHA1

      089995a0414086220deeb98e83fdc52751aab5f2

      SHA256

      18b30be65af60ef4e591fce5ec0ce52e5af1abc35f3a9a169a9ed30f05ca1930

      SHA512

      75b6b45542fa4ad9f058ee2a576afb4b0b6059a3d85ff527539cab48f95bdff5fa57ec7a94ff9d9051aa6367c6d32f89c2ddee8ea3fe974523b86fb8b843b2ef

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6ea056e0d621ed5b7e3df77fc01aace7

      SHA1

      c3817c1566ada76f2e45925e41fbc4d5d1decf1c

      SHA256

      02bcd14c28dad3ff5fef67964429a270b55177340b49c2d34dc8a8a391aa3e17

      SHA512

      3142f35d270d6147ef2d254ddb88817798ce21ce282e1727a150f8a154329d4b6f99408bf7e476c838d9560604a975ec0e6f1d161ce09298b3e72571a8fa0a49

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b65a7bc2a99a122d073bcd291aa2f164

      SHA1

      e4fdbcec7905ffcbc47c5ee10c9517cc23453246

      SHA256

      972d3b378bfebb7eb6a321e00090c06d55b21d794fac9955ba77ca3700fcf90e

      SHA512

      66d3846a63cb357677821d7b4f2cea4a70914b03a7b05f9f6278bdfcc3d18234ea1faaa652667b7e38c23049a8961b56ddad00030531a3eaa6ad0e2e66603a76

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4d0c21179bb03ebeabae9266ffac813b

      SHA1

      88b08c92c39ac8bc0bf9acd93b8464a1bc7d4d86

      SHA256

      3ae88d833a97719d5a5f4c4aced932d6aab5e9cf4c8966a1f899b6534f6c17a6

      SHA512

      f51135635b2737f637dc87ca54d90bd066fe64406a4556393545162aa8a3d6f1e0767163b3f82fddb83361788ad5d24b3265d28197f910d8e51c42b9c5b420b1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      af1dbd2783373aa4ab99f02f911e9ae2

      SHA1

      eee5139627d003aec5b5cbd7a9c891b21e7f37c6

      SHA256

      122fc91c36614832157e4312ee79939458085314a19baf3cf0f108800273b7f0

      SHA512

      a8fc3a2d60972d002e8742e1135c27837001b2829f3e91a623b807f86f9325360be709f38ffbc6e64d49f55eecc7849515f5f6c0d2b0c1a14c1d1c80d1cc6d18

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4e99f83eea7c5fae8915d7fff56c5ce3

      SHA1

      33aa82a28d7b2c435b3e8008563dadcc7bb8c117

      SHA256

      71ba7629cdac379de7099e7bd7137c07be4502e55c59f80c47fc93090354a08b

      SHA512

      31ebe112bc301a13beb1ebcf2f870aaf48b96409efa581bbf4882a06a73d6c666c7352d3b5a6cc4f715bf553e335fff4bf750da2ec3e842a0c0ebab96f7981f7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b9e5864f536f97cc1f8b6db995e49dd6

      SHA1

      404f58823c2715c99b3861e415c1015f027e5de6

      SHA256

      86a3798ecee204249f97b3cf4036e95858e8aa22c8bf1d0b0921513af56f7ce3

      SHA512

      c7baeadb7ecaaa8be0c52067324592ec5d4cc062095ce279f523fa941ba649c7d8ef6e83a7eb835a44c67acd8c12fbfca787ed7d4a7fa24bcd2ac9335647ad57

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6304d204d5547fe1171ebeec23459e3d

      SHA1

      17595625a036650efd2c7010adc414af26ded00f

      SHA256

      c31b2ee9a6610b4ec3c0618a1319b35d26ae4844e4cd5bece36c230ac1402c0a

      SHA512

      2025ef861920d1c9ae976c8da3acca6f16cee21d716a14c94c7333b10a210d1862f5bbeb7e3831bbae2b3132252da1fb22f86a4cc54ba43cce82a340fa3ec1be

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6df33d864dddeb56c21b80ba97a85ba1

      SHA1

      ec83f565e2e0b51324ee95c69f51e75e67879f22

      SHA256

      90fda82995a459723b813e14768e89445f723ad852217c7b366948ab884ad3b1

      SHA512

      cec650975c765ad141365926f808213c3a0f6de45601862b20b22fc28c0d837975912c6534abb5888ef0adafe87409748ddb57fd311db73db9a925e4ff55567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fdd4b90cba8306a3afae5632603d5a29

      SHA1

      366542934690b57406da0cd7e205108db01d88a1

      SHA256

      f632740a60a72f7e33059dea516744be982c49d7670cf20fca73d0d15b778800

      SHA512

      b3e1453d309b05ed450e31d93911c45a7825ae966076712848cb85ff32a68dec62bac2cab68cd736fb1224fc7e44bbca35df0eb6d01a42aa4269ef2aa3099b11

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a55461764dc23c09ff15ddcf9257c5d7

      SHA1

      a97c3bed59adb6d23acd7dd4d06e46d7e2bf7c6c

      SHA256

      98f4a933a738b0c14bc6dda64080a124bf4073656bd571e6d11d73aa1f7fd218

      SHA512

      fe9b6f5ae0892f218b06b684131cd2b5a7af176e44189d01addd6d2b0a089d0a49c09d42194fa6d18388f0546c7e5dc97ff9d56d93cf13b46ff5d943b429c2df

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a3a4318c42a4cf0b05ab7cf64c6dbdf3

      SHA1

      10ad682132931904cb7574ee4414654a3ab7fb2b

      SHA256

      17ed043e1953651496e6075c31efa33c5e6f0691ffe56e318077b1eb6f4d9499

      SHA512

      4406468e59d615706247de374d39ba311793a34dcb394f5cba97fcab7ae811bd67a6d5763588843547bcdfacb523ba5e951fbb59db7109b5acaec13e564be916

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8a9d1ce687d2e86ddfb42062c4ae6899

      SHA1

      d1da1643c180d91cc088ffa3dc947c4d0e5d4555

      SHA256

      972cfa5a73c70f90389d8ebc3960388cc71c80b46b13c70148d372cd9f9c94cd

      SHA512

      4abd9934dfa050d428d236f5a032ae04b0bab562c0aa7885343418c05f819cca942b04b4105e116c06780e4fdd955d2e66e7d2a9ccee3ab5cc95c748ffdc8fad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      79701d2206341bb19c52b963484f68fb

      SHA1

      0690e5fecf0b18443af86a1412e70df3e46b81a1

      SHA256

      6907d1a49c09afee5e59a2004df47473c63925fee4cb49dbd6af54ab81dca95c

      SHA512

      1ac2229c4e2aabff5a2a1d39d8601ce88afe7ddcce2941b85e50c557fd17c9e69486157f9c786f7fe9c012911b1392c679b6302dd672d8d9299bb6e3fd038857

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8f863616eca8fbf14b27376465412185

      SHA1

      72721632bf183de23b7598ed04fdcf426815b081

      SHA256

      19b88617f8aa189ec174acdf09f44d7d6c3303fc78af2066e6b9122461d5b821

      SHA512

      460773d4bc1c2a92866204d1abe9140c5a28bb28d0d3ae714284f3d8029f1915a1addcf3013e94444d2e60f05abd13b63c24bf7db314c6a6090818b26044bdf4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      250a252e9ecd67c5782d423b8120d38e

      SHA1

      74fd67b31f7d57dbd6f69ea9656a434e6d091c37

      SHA256

      2511320ec5a90d88d4a462919dc5584b1d1ffe3e013cdd4377f9cb173838ef48

      SHA512

      2a33483f2b27ed0a0f775b8fea886139181fe84fd9ad846d44d94c8827086553b115f2a8bb4a052e7ce7c9ff86c990dcb7b173ba17121ba54fe382db347b4b10

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7AUWETAT\favicon[1].ico

      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Temp\Cab1526.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar1673.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1832-576-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1832-577-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2292-587-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2292-585-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2292-583-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB