Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 00:41

General

  • Target

    6562c23c679a7c297c6ede83692a3d3e_JaffaCakes118.html

  • Size

    126KB

  • MD5

    6562c23c679a7c297c6ede83692a3d3e

  • SHA1

    ee6d0be9a652f4d5f9b65e525f9df7bbe0a26254

  • SHA256

    f74da60378211b1c3f0bdbc065b6b1721665646cb3a597c335b77c7fccf11b88

  • SHA512

    12f796a3599192eb953f948de172589bf21ef55b7e5acc9c78a4d8a28af165019b691ae8edff1bbfeac909eccfeed3420fcfe41a11fa8e01f672834ac8dc8437

  • SSDEEP

    1536:Sl1Q912WHpbEyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:Sl1Q9fEyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6562c23c679a7c297c6ede83692a3d3e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2652
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275464 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2616

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      21a8497707c6fc95a1ce106adf38212d

      SHA1

      d625b3cabf7753f53e0512fe8873afc9e7d42fa9

      SHA256

      d60c095670ec5914eb8d8cff00c618b7db17be0b01080c43e81c168729764808

      SHA512

      34139dec21bd5ff8409eca4f93f218a902139f29e44918290d2152ad925aac1df2216f28cd624b08154cb90049bb9ff99ccd93a8f97e874cdd95c14c51866ec7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c4d7091d5e51f7b7e1eb0af54c6cbf9c

      SHA1

      1dc6a22d3210964120b0f15fb10fbe3ece680f63

      SHA256

      ca53c402e634c2564b309b3b7f82a560cc62a15ab7c136c650389f04092fe916

      SHA512

      d63596c0856ab44d66166cb5b9f13d882fc53f879a71377c6cc284c7b8933adb790261e28c22f043df9aea6b69b39255abcd3a4ecccb55dafb5944b6038b6082

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1113263a60cf113483444f32a9b05329

      SHA1

      c735a7a0553010d705faa012daa8569447cac417

      SHA256

      bf38c8f8d874e0e945b8f495335946bd66f71637c09ff1d0ac5f4f295fcc4ead

      SHA512

      9b680354fea8eea01c7e70a8516d982fd19e45fe3bdba8014c6faaa08a70822ad887d72d7267cadd8695304c225b59b97c2c83404223ceefc6aabdfb525c7dae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      aa3827c3842ce2c1b45d74f83650477b

      SHA1

      ba78cee0c072a1a59a4db05ff469bfac9b98cf84

      SHA256

      c1c3a164a1529b9234b06354ff7441f27b9b230204466363d6f1ce7202c9e90e

      SHA512

      fad2d7e9bba89c3f17f05c340ac52cf696a13ef2ad05a7c47512550307291cbce57b2308ee47a233a0b8649f8554c9e43f433d0316dfa52104f35d8bc5d7a5e0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5809e0d02fd8538bf0f99f91b99bca35

      SHA1

      a91b6ef40d5f24e0651a05042e16c305aef82832

      SHA256

      97dcf2450c653985035fd473a072d903d5fa7695674c4db9b03fe2f5b57bf57c

      SHA512

      ec5a944327c516e047fe44a62980abd28530ee5518519b7efc785e0bb66816a00d432479227785d3fb67d373f3f661b9197681527dff2c43b9f027e2435c238e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b920cbad7fdfc323392377d7e801419d

      SHA1

      111881bd6de48ad98899f74a9ab8f0e6bd1b98a7

      SHA256

      6c170af63f5325571653ed871fcfca3c6685225949ff4601ad192017109d81e4

      SHA512

      ff08e719e8d6d6515cd33c4d409c85cd7a37afc29174d8c96ec3ef26d669e8f3cec559fa3361635047d8203f0080d6e0ac8098f5120779381dd4acdc4c0d6fa8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      438717afd97d366ecccd9a2a9dadb1d9

      SHA1

      d71fb0e4f088427fb5124f89b57df8630c0fa047

      SHA256

      6951c07cb98e35c2dcf2811d5cc2ffa72dab35300db0fd6a8df92b0bec9540c9

      SHA512

      28c6c8abf7ad91810817325ab34a0f77e5f3202d71fa3d814240a34bf168a64128c766eb35db3422be4f2706b3af6739a9949b103d559b9def0779415fe37e30

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      81ba5da1b32a492c84b938dce4090519

      SHA1

      06e1e741c7960e8d3de50dfcfed7e136df8c779e

      SHA256

      9e64cc5ae147e9781a34bd1e97e704cb41a6ed7006b3acc3713d05581c51ac8e

      SHA512

      fb322558c4dd69d317cef4331cd6a58c096cad4350beb8a7f287f69992887ac5105dca045ae64f29c4f55f778a0e5d69bf638211398b85c9f054f15a7aaedb11

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4f61d827f5f5cca15e7befa2047aca3e

      SHA1

      1bc6d8b8b996a8153ed6a430bd8d0c0f814645f3

      SHA256

      2297cf85259c09807d79b7d2f3d024be417263109235a3c3f8586765c9aa5532

      SHA512

      80118c71e5fdf00fe396a947b944cd8bff91398225ba609444e53c4ef33fc6676ac12546d72814413b0d242f98a8eb27cd2dac0a2a9021a59a73f708622f480d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      75f418ed3944b5a5026c1fd6304bb8eb

      SHA1

      3f5dfa3e2d3301af7848c4582ce332c599a5bd41

      SHA256

      77f2df02523b0f54e08571f5d5f8dcc750894f02205ced6037c31ebfaca1d584

      SHA512

      49b18febca0f37c7d4110d60bf39c20538dabfdb912840c22bcdd088f5d52a7228997bf49fab41c9c493b6c011005f905f69c756a46ab9ec36c06c2436960650

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      426d4a61532adb2d144885441b6ff88c

      SHA1

      7a2ad4a2152bcf247f9778382f1ec94d060ebabb

      SHA256

      52900893298d79239977a676923a6873f72a59400419935d2e4396d6b4ad2481

      SHA512

      6785d5f58666da18c15bc1ad01ddf25488ac1e2c8b5262388b4f4406eaf046ccb83568ffe2ea76af7e23acdd4929bb095e8b38697f7558b0e6b3433220612bcd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2b7a9de396b09b7672b07ed02234ab9c

      SHA1

      09c2830b000aaeeb27223dd17084c116e83177b1

      SHA256

      c2f7809a605b95cfc877fa0686a187aa65688e3da54ba6299572bde77c99c976

      SHA512

      169ed9cebfef6b89e2d2d0898d19a09f4f15e16fab04a87c6c1644e98f4dc191cd1b883efdf98c53daf0322e1433bf9069852f7d66403db019e8e9c803a7d6f0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a93c4d7ac90b56bad20d573412073cc8

      SHA1

      5fb0552fe788f318bfb28855e80568ed4e7d9ace

      SHA256

      9621a9f660347b06b648508471d1dacfab319ae05f17b6d264a4b6bef0010f99

      SHA512

      73e30e8244dee43c83b505a3b77d63afe7f8f08f81dc055d467c164b182a9752147c84cb00af60dc0105cd5e773e0ab910cc8f0b2e493263bb4b50b8912ad16d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5c8dbcf3e0c592813ae03fd13cdfe92d

      SHA1

      e1f413439c33678aeebd0061280dd6e0e1ea5538

      SHA256

      6488c63a0a774f344beaeef796e67da4aa4b23b1ec7f790b14460e751daf6321

      SHA512

      788484b20de673058eb8a923ee204761e7977c0e09ae2095857536117e3e1e056ed5a83e657d3403934dd0f9eecf54d6cd8210663ebb1de1b0154230c7787710

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3955ec147c38be9de9d00d16ae927ed1

      SHA1

      26a7fc3923205e0259998e54e2ec9e012514c94e

      SHA256

      7f116d9ee7e558865b59d81aba506e1e0271e568b30d13274bd3427fb84cf9db

      SHA512

      ab744b2e58662d6046f95b671c5c39d548f8cf0c650526ad02b425927958ab727c06c9b796f74b5a41791084e524de59b01b88417c9195bc6c7fe3a06f275e45

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cd7e90a4071fc7cbc3281a0642e2217a

      SHA1

      2e4c7aa9b269b8e518da42ffda3761732b2bb161

      SHA256

      facc24c971dec33243828e4eac769bc52f13115741b661541ebee6b23ed27597

      SHA512

      e871c87f56743c939bada692a6c6439f7c724f8e7f5c36f89ad07e9251c1a90cedbfe8b2e913dbfcf0ae0f4e59322b5271afa3c3f24e6f21fce80fcebd3fd701

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b0d3c02c9f3f26568321236eb6ea039f

      SHA1

      a31f9c6525b026d98a97e90266362b6227d42b0b

      SHA256

      62404621adcff2467243b6dbd50e49798749db00b95710c8b14088da8e87e865

      SHA512

      e9cc49bdafb0921b1a13ddb7bf98419638fbbbb7c40136d60fe6326e3f15a9c61fb9be53392b3da061a7259bcbbafc18743505ea5f8d9f1d916feb7874a8bb6d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      57ecc86d3f2b2f98b64cb77f2f6023d5

      SHA1

      7e5bfe965e966a26a7cbf950a0fdf61e37343ae8

      SHA256

      aea45ad034757700727d3730ca2ca220af58b4b3d2479ee90c8d5ab0b565c659

      SHA512

      7fbd76c29658dd7ba4c2d535c0a2e77573db291d858bd85c342cc7b9bc78bf3d20a0210c6602ed21831ed7dbc38f0f4de18f295f83e20a0a9a09054ece9ed105

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e7cb3a84439982da6aec5a7e457b5e0b

      SHA1

      8985571b3a9b2fa21066c0fbb98609e27effbfbf

      SHA256

      5cc7e88ab3b17311724173746c4ebfaa9b6537da61a0643c7a4024c98513ca33

      SHA512

      8232e31be9e9d1faf71fe393459cbe9f9cd8a338e5c3a4d729ab7df9a638d33c6a3497e5fb5bdca94b9da491d05ac49ab3403677e9ade8892527c743a07f9cf9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9ba96be3c8a6361d734b1a812e69e6bc

      SHA1

      1ddcb9afa66796dde4f54507175ed7c08035f2c7

      SHA256

      6f0a58ffe628054aa568cb956258bcdbb458f2b048600ceacf9c8e2341c5c6b8

      SHA512

      c6e9f38aed3fecdce4496f011f68db4c60819e37efa719dfa5e42a90d76de0de482fe451365743bcc61c7196f5233649b1b1f14d21f9f5d00c07ab743b37e4b4

    • C:\Users\Admin\AppData\Local\Temp\Cab4A7B.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar4ACC.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2660-19-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2660-16-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2660-20-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2660-18-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2660-21-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2728-8-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2728-7-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2728-10-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB