Analysis

  • max time kernel
    129s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:11

General

  • Target

    68f4f9eb587e1d030d456a4b30b5e0aa_JaffaCakes118.html

  • Size

    155KB

  • MD5

    68f4f9eb587e1d030d456a4b30b5e0aa

  • SHA1

    165cbeb561576d8c5f12cf0b5fad24095e598d44

  • SHA256

    3dcf0bae25a23af1cbedfa0e9b64f05491e3eb2abdf276051aecb7206b96dd0a

  • SHA512

    04a159f42878d08af24caddbb8ee7118a5f7fca442a9eb7c1685626d2adb317d45529ced2ac8efcb175fc109297d9861cad21e7504eeb608ee3c8c46403a55fd

  • SSDEEP

    1536:iwRTyZcVtXmMHSeyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iayCSeyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68f4f9eb587e1d030d456a4b30b5e0aa_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2956
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1504
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275477 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1824

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      228647ef61df092c07de185b3e0d85fe

      SHA1

      025faad0f81ea49176761d3d6ebe3e791c9ecca6

      SHA256

      a40221ec6655e427780f1c9e1ebf352e816a4ccf377ffb8b2e872d67519f1996

      SHA512

      02eef5b62cb1a2d30674d8c8434fef69cef9f6da76ea1d62529a8a6e61ee7641d856815c240fc01d2376d593150fbf53f87d93d813aec9c73a88b2b288361b7d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2bf749348626db80c3a2e8dba804d271

      SHA1

      508e9a3bb48e7e593b983cae0bc32c75a849253c

      SHA256

      9cb803362bd12735d6458091721df0c4bdffe8272780a84922a8d35b441a15a3

      SHA512

      65d1d018a2787cfb43cd45cf1fa550182f881147cbea02e3e681c375d1154dde80b44e7af8ad574b47bf32afb7c3d89f3d3c36431433056bc114812a2e7d11de

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fd4e60dc13464b24d61a4d8a382c9b10

      SHA1

      c7ea5778d43e64971ada5ff16fc41ee7bac8b673

      SHA256

      2189a4124ae5b3ee31dcff2dce47d18c01e2b8c9967ce9c843cb3a6baba6d5b5

      SHA512

      a702e457b5d06386fb17e37d2b0ece28aa39e26ec1368870d475d29b43f6da9620a3f218fc84c2d36ba4eb2177447904b5532b806563c54c55e0f47d2970b3c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9ec8f0628a9f279e4c477a8e806d3c2b

      SHA1

      b7cc7c6dcd8e8e6c82d0d06d91b187f9c32d7c4a

      SHA256

      bbf94f7b47bcc628e940d1417306be08cf0fc619cdb29e6cf867be6bcce00397

      SHA512

      69aec3642d438bfefc8745fbaa4f36275132caeabd54f0089d0f919b846a09798cdf66fbe6f59238d81e4e6e4fb4604261b707f4aabb6469ccc80bb022a3ce8f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      928bcbf9cddd23850f8983da8aeabb59

      SHA1

      8143db64efd58f6f425ffdd388e88e64fe133aa1

      SHA256

      ca7485b4b21fac7b37b1f7f5d077db6b34d147575922a2949b45eb37e5e6e6ab

      SHA512

      d729ad821b4d3020ebaad468bbb41d0e1ad82de94a4df697abace028a02cf2d92a9ca768524dd361f7355a55428da978946c1f76c2b9ad9f1c392215639857f5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      60f553aaed0615534832f22e2824b308

      SHA1

      798e49df09130bd8140b4a8a43a05f4dd6fb5edf

      SHA256

      fd740cfc0881d1e5d5e266f225871fc65703fd673d678e0afdc71f82183101fe

      SHA512

      d5d3988fa14cc662ba70c405ffb6677c1cd535826413e0ca61992f21aa3613c35d5d981e092fe903068b74119d2b544f94b213a1af9fd4e84cf3e17862f6f8e9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      141b6f13aa7c512f20eb334b8c3e64f0

      SHA1

      cdf8b6217aa4e6b5d4236aad2f204b7a2c93263a

      SHA256

      b794951836f5e0683fa5474ce06067e34550a40ff27a0d6e53a8255143720840

      SHA512

      545e0d2d55b655869f1cb21fad7be2aea47a792cd7df957d661825a5dfd46ceccafa032465c473bc3e374b071d34c7f7f14c46b730804c8758077c94c3eec4d3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cc3644488125a1e5985a0cca8c8e7dc4

      SHA1

      5e894ac4cd9104bcba74fbba33120ceee3682375

      SHA256

      54d2a9aaaec7d5e03f1615483d893b12c6a94a328d12c0572168769790ef12c0

      SHA512

      99fb875bd632e1dba4414d6f326d275db3306472fc62f981d980d6a457c2aa01d63da77ecbd676d58fe4628c9a760d9ded87a44be093b66c8c6c40b545d65d96

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c1658df1e000a7e22802339c5204aea9

      SHA1

      2f7a4079f1b4d8e4bc0528d0d1ad567cddfa0fbe

      SHA256

      75669336303981699e8714c714827c0345dd2e178889398369a906f394f91703

      SHA512

      238e38f5d99ade3bb82ef635729481989ec3342b5cba9ff770ee6a989e3a2b4a9fdbe165454816c2bf24cda8dfb8211c1d77f1d5dc8911a42764af10e4ca2afb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8465f8726ef71188ce6dfd62d2332e17

      SHA1

      bcf18aa2ddf76474f0376ad3e60f574286e376b6

      SHA256

      5fbe9eca88fbdabe072dfce8c6da2636805b3e8e57dc1daae1a2ac5b9f5e211b

      SHA512

      445b316bd081ae81137d757f6c8122615e25852af9c7df014e7ad6110454087545c7751555a3829269bf97112825c26b79334a127a0c0477c5ebaa1d2b1d7e58

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      084c53b5c97ac5d8a183d243da675d2d

      SHA1

      e3ae130c0de2cb6d16f87b64adc550863c41a0cf

      SHA256

      f6d12cadeea3d69d572c14dea93159b52a7ba0195d3ad68b5650750e81ffbccc

      SHA512

      80d7d3d246598ad4da1c5da07d6fea533dce68622634287711a1fcadeaee0f5e721da1a32924dfc438b964ca6e94f3c1a7432b3630a1bf51669bd8adccc2f61a

    • C:\Users\Admin\AppData\Local\Temp\Cab2ADA.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar2C76.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1712-482-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1712-483-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2956-491-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2956-492-0x00000000002D0000-0x00000000002D1000-memory.dmp
      Filesize

      4KB

    • memory/2956-489-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB