Analysis

  • max time kernel
    120s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:03

General

  • Target

    68f0db9ff802e1e1827225e953e31886_JaffaCakes118.html

  • Size

    347KB

  • MD5

    68f0db9ff802e1e1827225e953e31886

  • SHA1

    470017233737eca73a774958b2d58d212074f3c2

  • SHA256

    e09a398b7bd7149c12f0ce0f38c7a67197ec84b50250f76a4eae0fa5aa8d40fc

  • SHA512

    8632af8a9bc99dbc4594a390253ecc00a7460a4d0416ce3eeb251d561c8a372d189af7164b17f07ad2330c60437d1bca41be7853320453a2aaf2c4d76a12bf31

  • SSDEEP

    6144:rsMYod+X3oI+YhsMYod+X3oI+Y5sMYod+X3oI+YQ:/5d+X335d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68f0db9ff802e1e1827225e953e31886_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2500
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2548
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2768
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2156
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2800
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275465 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2644
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:3945476 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1924
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:5583876 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1588

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
          Filesize

          914B

          MD5

          e4a68ac854ac5242460afd72481b2a44

          SHA1

          df3c24f9bfd666761b268073fe06d1cc8d4f82a4

          SHA256

          cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

          SHA512

          5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
          Filesize

          252B

          MD5

          ec6bd48eadbd51a6370db176ca8a12f7

          SHA1

          de87f2c39d33e76d1f3ec3d5a4bd791e383e9a20

          SHA256

          702334a8f106440fd6f9a7b4a3df008d06b6ecd06bf9147e9dc2c4438c5172d2

          SHA512

          6eea490edf05715319aac42f2a09fabf0d45872e1774271da3051f91b6778f106fa4e8f68aba2ef09c6e715a4e8e36d9e2e20376919df5ce9b1219cb701c1ca4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          5dcf3066a1ac1a9ff9d56c208a611620

          SHA1

          5a702897766fd6b0481fd31161b33d5ff6255155

          SHA256

          d7de51bb42e173ca9dd7e7bb513be8e051466f85501ed6721211023b6b9c92dc

          SHA512

          08b644d7d7c5ee9bc7bd4e394644c8d6e8ff476f467e3936563cade2ee62e801ad48f736a3d90fa3362a6b3efddaf9bb9b663a57834358058943bf73ad1ced02

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          006406f7ed5d81b36704965d4484baef

          SHA1

          b98393ba1e97c69195213e746df6058c70f0723f

          SHA256

          95748bf99b3576534883db38776dca4899f5085981d8174e83f46ba986465452

          SHA512

          3f0fa304e52d68147e81db51cd99b8c4883d526d0de54224eb2ac0786cccfca7abea09aa2ea9334866cf06d0439b9ef109ee62dde10a68d0004dee65800aa974

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          5b5aad3e75c4227544c512d7c45310b3

          SHA1

          f9af6771696466005869f856a24dafaa6be2c1e4

          SHA256

          78f355e77b5938b7878d6472e41dc606556ebdf4ad3c6215a608a5ba73940a22

          SHA512

          574cc8621fef26e9b4710e9eea88ee2b3f367877ccd31ece53cdbf95fd095dbde62e8c7c3a2ac159942c32103612496d37fed4bb9dc9015a4cbf06e595bc4d51

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          18ec555b917957b5dfee8758bab5cefa

          SHA1

          239b0455686809c42194b817b1fac8e7fede8363

          SHA256

          71d97f24953432ca1447170c152c6730e5785a6a2e83867e5373519def2a5b21

          SHA512

          8564ec21f271b91a78971a7054f3e21f1acedbf9059d193f9f2477098591d53ba0f91d0248575dc9d0be4422881bb1571ddcb3936ccfd4af26404cfa57c1e044

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          f0950479854eef456e33de252a0d3df0

          SHA1

          6ff2d5e6be99a65ae623d8e7ac1a92963b172199

          SHA256

          4fc466ccf9da05183b8746eb14dcdda875ba817df46d6a790e8d037133b91f18

          SHA512

          6f73999609d3068aa73653d4cc93e6bd77853c14963396c9e88faa8cd2a3bdfbd23a3dc4a96de753be6fd76ee72abfe71664f7f744f5402e6761435746b3a864

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          13390b54e01092d65a8fdc7a53f32a73

          SHA1

          397ae3bef28741200ed5f2c8fa678b5054adbfbc

          SHA256

          e7f198b35945480b6ca83ffc71959445a9117f151bb0b96f204258b5c67b5cb8

          SHA512

          28cc79b9172eb93f867357e55c530cdc5260d26d3891c2524e643661c559f1e9d37fe3d67a1e042b3ad5117d83143c6ef806f46bf29e4aac5ae46136005ec67f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          f16468785e2f0db747ac8fe459ee6e61

          SHA1

          d7669bf264867144b4de19fade6dc48ac36a7d40

          SHA256

          c4029c87169bf61a69074a210f08345f1a86d52b188e2d5483b70a7a579effba

          SHA512

          4f1c9a3a6e6d403715142b05c51f2d7b59a2c52087b07624017cfdeeac079fb8b877ccf4bfcfcd559c7f17234b5fc10ae1799a46f53a44aebd0fb9d906ab6514

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          2bc8eb4951a1f2ac37a1855aeaa6f28b

          SHA1

          516d305b25e4e061ff70a3e5436af622bedbe930

          SHA256

          d060e9150120d2cd01e5ad511ac3741c260905af107accafd1a97d6cb2ab364f

          SHA512

          043f567e17da8b46b9a784d7ed46de0d1869dc09ce42e3ea89555edbfac89e2a358cade509baa1ec71bdda9d03be94bb5c43cf7c67a5f0131b5933966d46e45f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          4d9fe234ad48aa7a9fa8595acc7c7f99

          SHA1

          37212e493891d7dd3f0884d456d15bd0f08d8a40

          SHA256

          941dfa2e871eced44b8dc2e14eb9725e02ca78f8939c9f190b1782b1f6a54fd7

          SHA512

          73fdaeed47cf08ac6007ceeaacc5a21ee146271e8d43be88dea6bda90ec22751b0fa285446b4e95f5bb41e5880920e1b0195eeb2c3d28ad107dbe5b220b85c1c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          f90e4017ec09a02c726d3f0b46b6e52f

          SHA1

          a9a5a7b5546cf563deb4881119ff6534f6bc314c

          SHA256

          526ed779c2e4c1b85e48627b71aa4d3f18d1be0170e63679486bc7f64ae63bbc

          SHA512

          8fabacd0f49dcb582e030dcbf35ee2578b009869af7888d31a5d2c4cc37de00582caecad73da889cc3ce9c43f8947759ffe0896f288ac322ed0792560e43b6ea

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
          Filesize

          242B

          MD5

          420fc566637b47eec9c28227ddec8399

          SHA1

          3e89aac971a4617bdc01cb83ab8ead386b6eb55e

          SHA256

          362f7af9557801295b19ab63c952a7e41e5ec2b1d20aac8f4fdb840d6f9bc042

          SHA512

          ac725789ca66e23dce40c4436e1553c239d7143d6341cef99d750a3ee904ca53269a2c995d13e76b5189f18f1294625cadeab9cdf036a03ca4bd3ab79b6dd4dd

        • C:\Users\Admin\AppData\Local\Temp\Cab12B6.tmp
          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar1412.tmp
          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • memory/2156-27-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2548-21-0x00000000001D0000-0x00000000001D1000-memory.dmp
          Filesize

          4KB

        • memory/2548-22-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2548-25-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2744-18-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2744-16-0x0000000000240000-0x0000000000241000-memory.dmp
          Filesize

          4KB

        • memory/2896-8-0x00000000001C0000-0x00000000001CF000-memory.dmp
          Filesize

          60KB

        • memory/2896-7-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB