Analysis

  • max time kernel
    135s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:31

General

  • Target

    6901e71354280138737dcd6edfd41fea_JaffaCakes118.html

  • Size

    158KB

  • MD5

    6901e71354280138737dcd6edfd41fea

  • SHA1

    f613a81e48d441cd5579a709b2459b561cd92655

  • SHA256

    4b21b2fb4f0e73e4f8af9b65a21a56d8ef27221885942bbafaec0cc472ede0c6

  • SHA512

    7e1719d2d8167a6b4525be63e01a29e111796e78c9b4ac5e51d713a31efa16c187c79de97b5c46d860e9f3aa11f6d5a2f5cfe986fb33938fc1591ebccad4c709

  • SSDEEP

    3072:iWAtaSox/SyfkMY+BES09JXAnyrZalI+YQ:iptaSsXsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6901e71354280138737dcd6edfd41fea_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1256
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1620
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:472080 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1508

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      af5db67003631ae6b6b9d2b554003453

      SHA1

      5a9c29c4b81f1d9ea67e2df89e3d94dcc5785d43

      SHA256

      745e2aeb6a76cd6797f99af8213b33c7552f9e07de433c1d49098de998824ecb

      SHA512

      0dc6aa532a0dd4d177ae4127dcf3d283eeda1f315da388a8277413d4bac792cc5476a4fee8b2a63d509f060ef19a4274e94d72f79be113d9d9f31735160f62ec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      830669285eabd9d77ca8a42ae359636b

      SHA1

      a52c28f5320ca5e06572b902d043510c9722a131

      SHA256

      145029b2dc04573e1333a56b7f2a330bb9de1ad8a9d8bc8bf7ad72adf2a81bac

      SHA512

      d967c3a69daa4472431a93bd994cce0f5f9f8dc215096c08515b9fb4be168edfeacf3089bb01f4ac421bc276ce5327086e58e4477df8c930ef8df7ad2c64003c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      dda6d4a05cff401729aa572453f09d80

      SHA1

      f94e6cec79fc9a116ea50bcb36ed9267291959a7

      SHA256

      cef3d4bda65ad4629efc95af4ebb977f3526c21e4faaf69911b67c069d68d8d3

      SHA512

      2fbacfdec1fa082bf3f926b23211b1b03ba894a70ae2300e4a6f64adf6307d07bde6ad231aa9e758410c51e514069b766b45e80c681b68f89a487627efb0250a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      282e9c460bf097099c1fd251a5b7eee9

      SHA1

      31b295bec057cddc0ea6cf7d0b23078b87a4bbb7

      SHA256

      26004ca5c1370504475a4c223450d4edadd79fd8dceb358beb8b4d99b54540b7

      SHA512

      d831d84c8b765c1009ec37f650f20d5a118a1b067550704330bba643e656e84c6dd8feb57fd3ad20747a52cd11cf7c4fa213cf7069882765d74176e9beea310a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      87f609bcb4897e912d5db97d2c61172f

      SHA1

      4d2dfe37a4bdca3938eb46e37b2c91d51c767fc4

      SHA256

      f7758438ead481cc24f6be49fd2a21da5266007c2b5d5e4ff42105f46df8577d

      SHA512

      2c4946ade97d970ebb2aeaff6a5e9f28b7bebd9525d95ff3ec314ebde8b9fefcb22caeae1240ee2e5fffdc4f09739324e9b6a63636d80cff1ee2cabbcab5856b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      757adb93b627ab7ea7168318fac37ae8

      SHA1

      9f72abdb2044f203e583bb5a668f1c2dad4a6b30

      SHA256

      005d7aec735f02e96f4c8b5fa9345b8ce8ad44bfc07b3601398b173a96f5d4ac

      SHA512

      92e9a033cd7a63fbddc8e54c1d599357c87c88446f138676126d2655e5492f5a5490a76a0563ebad349a046f867f9c2a96a53729f77972c5c9e071b59b14ebbb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c3f53bffe752b68c5e7ca985d062b60c

      SHA1

      42341d0f1fbaffc6cc7fedf3ac74ccc7682af984

      SHA256

      76eee1b894609a30f3da7fed0bbe978500b59ae022ab83437464a11dd2fba6e1

      SHA512

      65b0f8a031453a88d7e887ca5a8c7321b95ceba3572f0fb98d9533e0d4d53d6a59cc5072cdf26b6a4d2fe453d0023d832e82bb5dab8bc731dec3d9e658b06394

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      dba4c113c9a862e5c0f48be1c6f39c55

      SHA1

      87633aa3dfed9bef248a72a0b98f0ac467849b94

      SHA256

      b49ce9d260fffca17ad8d617273aab0e60abc49f83693ec0a55dec95592409f6

      SHA512

      00158603cb974f570529a70ef7af8a43bdc2230d7ab38ea98c5f8580606876eaeeaf3b5505da47d0a83771ee9e82fb54caa8f7df93c564d32bc10663ebdf21f1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a62c22c3d58ba44313fe29dbf8512616

      SHA1

      74eba3188bb17102504a5e28365af6a806993cfa

      SHA256

      4aef74a8ec2063ceecd537fc7639e5e76588d2628d1160fda3be03027894faa7

      SHA512

      049c33d4f6d51a19612d3019defffee986c38b69435b51ab2ffab9c3c1ad64573ef1520fa188c9a344d392becf73b90db565e461f0a771d9e778518f447fe155

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7339feb74e8d72c6d4ea8afc3d3c402c

      SHA1

      8412f89539de84327796ea4d0b2488805810aee7

      SHA256

      94788ab23c28c059ff83fbef085f1b158d90cc03559d91047159dcd860e4c62b

      SHA512

      2b86deaaa6bc67f1ecfa8881ab620612120761e9d8bbe8fcc27648757bf8577e6c6b7fd725ff7b19acbe49fc398ff503541f92047b44eaa3b7dde953695451c7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6df9b375798a3c2019a82c6b624a5463

      SHA1

      ccc42859b445808b31a2181e7571171876775f6e

      SHA256

      1bbe8adc7cc0ff6b584dd1f50bf58ad5b436cab4296f8201e44c791eac879f71

      SHA512

      64206f20c684980368c1966bc883900d8588a0bc91b9420232bf52526715178502607f09124c801270d0823df59c6fe6b43f7253c5ad7f9a1e85cd6826ffe370

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bca63737db25880a3bb259742066d614

      SHA1

      1bbf54f053abf6f85970f05da6f580cccbeabd5d

      SHA256

      49ab09e85e7ff817c42dd2b90683e5a1bc1d788edd407e152a835d8c6c64db74

      SHA512

      b04413a2a3295b99fd6559a07f32198d6bb17fbec554bc5ff5b2f4d395215bed414ef889783372bbb0d6552241d8f82cabfedf95535c84d62d1e8989f5c80605

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3941d1573b944bd92c68952792227528

      SHA1

      f5dedc83f7427c01e64dfa8772185fd2aeb0e139

      SHA256

      13e39ca7c59c1bc75953b7be0a80f8ced2382243decefb68a0827e4e062968e4

      SHA512

      f829d245cf12853614e1d3f189ac8a418d15f6865e7777483ced405f2fe0f2a01228e3ea57e7c3a36602c49a1cf72f0c81709150efede7b2a8852868775734e9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      686cbcb5ca3cd06687faa3f0d8d36d5f

      SHA1

      01307b9836451491b8fc32869775695adf222ac7

      SHA256

      b714610a36b33fa24c61f9720b8a83a2544af130abad4831720e7b9c8b6f2a87

      SHA512

      bc9787c9e99b5d3b002a520b83f893a727ed5c8747d5c7f414c634e2ebd1c7275d06627cfa54d876e7536a7188ad7b62d1ebd43558bc4e958492a258d0362716

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4ff5a140abb0f7c00a902eaa4885c810

      SHA1

      5ddbce1db48279868e0adea6c27b8d25b9af695c

      SHA256

      11e55efe3b92fafa91b983dcc7a0e5c95e7261a1ccfab6319a3e158b3d9c1ebd

      SHA512

      cb16a05622f283969259e37f990e1567984e56ea011a1dd9bd8475bec4f232684e5a17f3526421794170edbb6c8aea6df6e6626ba301020f5b135b5085816008

    • C:\Users\Admin\AppData\Local\Temp\Cab319C.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar379D.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1256-494-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1256-491-0x00000000003C0000-0x00000000003C1000-memory.dmp
      Filesize

      4KB

    • memory/1256-492-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2188-483-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2188-484-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2188-480-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB