Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2024, 14:40

General

  • Target

    679bbde13e6c25068461d898fd4328db_JaffaCakes118.html

  • Size

    341KB

  • MD5

    679bbde13e6c25068461d898fd4328db

  • SHA1

    647359e17228b4e76caaa36a28ba8132d0d9226d

  • SHA256

    10b0f7bc6c793641ad62d36a152d4bdb1a1a5a61256aa88b6a62da7a9fd787a9

  • SHA512

    fa33583f6be707a2670b976fade2537b0197f3b6052227b3667ef5c07a12ec3969a245e2e69a3a7270311665cb7b5ac56f1ae1ff652b5cbbecff019e4f2b81fb

  • SSDEEP

    6144:SRsMYod+X3oI+Y9sMYod+X3oI+YHsMYod+X3oI+YQ:g5d+X375d+X3d5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\679bbde13e6c25068461d898fd4328db_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1376 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2556
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2548
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2684
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1376 CREDAT:537603 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2532
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1376 CREDAT:668675 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2564

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        5c99187b987c94e99eb3eed38a17796c

        SHA1

        e9b9be14807164e6151c72177cfdd252d7591948

        SHA256

        5e306e8ed99707902669851718194dbf2a5640923aae880457d932419d3c1015

        SHA512

        d0b7f935421cb38a93b0a7c89e24cdac1073c26f2724134415953f052fb34f3b58f6562357caa948fd332a8e70f3e47e9ae3fe42e52f0d05bb6960ce00e57bf0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        7cf7694933cb960b34d53cc11ff58b02

        SHA1

        36a031aba5f24be08ff85170af7099673768b17e

        SHA256

        9b122ee858e191b0abe5e93eafd1c754bfe8c5394552d15669e51c64a8c426eb

        SHA512

        79b2432c030dc174c09363d783e922ffc71a72398e4ac82bacb892d951875e78b29bc1fedda4f8a3072b68a24e56358da5c942721a9b8e46ece65671d680c12e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        6a1ef1cd7481197dfadb3641e665cd85

        SHA1

        84cbfe9dfe73e5ab54a9466d7a8a28cc7600fbd4

        SHA256

        63ff96368b06619a3808ba92ae52095f2af30fbbf6ad76cb354a96d5a84ef5aa

        SHA512

        812719f43a0032d1a2a63f580980d1dbd2367936a0a196ad3c2bcd4c7e2adf6948cb6bf2f384dc42bd25a5cec08e86f93e03a35ee1a5dd179b54f7f937d737ce

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        f72be72de75b624e9a07fd0adfda655a

        SHA1

        a712e3bd03c6197d2c7f210a4928fbac2b1d892d

        SHA256

        0b6d2bc8d47df51997b2e7e40d0a13111ed2b33fa757c512098ee4a357368559

        SHA512

        563b502acb94cf05097fdd6d7348e61b4aab1660056c37a5397d9556d9dcd025d2d6fe09cdbcc08278d8709fa8d6194725a0a7e92b3e3604cea6ea9be12bef20

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        a16742b9f7a33c3b76d448405402c136

        SHA1

        4ace00c204d005d841b8a866c03c1233fdf7c5ba

        SHA256

        e33723bbb124cc1e9774a451abbbc10a96e0a9f460b10c41612b8c4228b6b6cf

        SHA512

        6ffb3d617999fd0e1de5e32e39d668af5f2f50b38384967f41523c2e7d1d4b934834db69b60b5a6d7935622e12c3fbe1c82b67f6a2718af5285d28152d9a195a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        8061bf1ecb23cf491140f2905bd91849

        SHA1

        c1a6b014fe9f26cb27485e8889ae4efd100b4f19

        SHA256

        eabeca90ccf3dab8393e57c26086fd0a3f17816177b54718143d18b3b07ad198

        SHA512

        0345a62d977ed1b7af97f1a8e56f10894dc6680629c6bc428271b1410ac8287da2f2320071308bbd6b8e7b0bdcba4bf73f9c4dcae22523e7971e5caec4cc8595

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        01bf41d3b3ab435085f3959354da4a58

        SHA1

        12c34cebbf964ae19f2f9e56f955875afceb3136

        SHA256

        699573b450ef6da5f8da6a335db9c05c87ab67a1e3e3b2a5c8077c7903f1ed2d

        SHA512

        380545042cbfbd472a62ecca40268a03accb6186bb41ca3f92d21807955065dbde69c7698ea9e83c498d207708bc2f1d63e00f07a21a181cb617edd59e087ec1

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        d600502164110b474b59a4175f46a4f3

        SHA1

        1a00778eba68fab1d2f5e52dac538e8c558aa4c4

        SHA256

        c1a6c2d31d0a39fb20b51f47e0568856a88a9345a31096b1d9715bbade8a0929

        SHA512

        f28c37ac03020fdcd67020d40326141c70e0945d8900af04593547a1c807db66b871dfc2732da944eac0c2fb0535cc0695235536265da52f39a206c885e4f611

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        d532fcbb42ceaf1b897b331fcce71c22

        SHA1

        46924ae51bbc2a816d5e48d7994ccc2928a3faf6

        SHA256

        be1d1e5be1bc95d8fe9b803ee630a1d67b708ed50c67300fb3e15ca1edff2cfc

        SHA512

        0a817814e7b0f4ab56f8390f10ae3cd0c5e18c075a27b6a22231ca69ebb3e764e6f4c25c1c5336962a36e3e792c8bb7743977332ab2ce130afc12334cef421c0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        ccdeb99d68c33e9db5dbf3bdc13f30d4

        SHA1

        74f22e52a4337a66d230a9f4fac2313f45565b77

        SHA256

        d71041f2c06d14e526bdc36b3eca705e91cffa11f5e1bf7708125896a69f9db1

        SHA512

        4a915aae93c22dcb52b3f9010c5d1a8464500772ed090ce84a3415f8768de296afc051beb130a71d7503aa4aa9ee3d0de54a9377c9a6c0aa951484ef515e4318

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        a3045490958cd7d824fb051337ef8bca

        SHA1

        42b2b081d3ba1c4191929fde3137a4316488fd21

        SHA256

        00c91129f6b275a4ae81d4f7fa92e6ab9a770ad86a9cea72db83615bb9430961

        SHA512

        187273ba670f9a3c2cb58700a598070072f58adff788370727465067d54908342f02190b7a97a19ed42c0b9eee41eb2747f7a78bbc9a29125a804e57792e6bf9

      • C:\Users\Admin\AppData\Local\Temp\Cab3BDB.tmp

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Temp\Tar3C4B.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • \Users\Admin\AppData\Local\Temp\svchost.exe

        Filesize

        55KB

        MD5

        ff5e1f27193ce51eec318714ef038bef

        SHA1

        b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

        SHA256

        fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

        SHA512

        c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

      • memory/2364-9-0x0000000000230000-0x000000000023F000-memory.dmp

        Filesize

        60KB

      • memory/2364-8-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2548-22-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/2548-24-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2652-16-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2652-17-0x00000000003C0000-0x00000000003C1000-memory.dmp

        Filesize

        4KB

      • memory/2652-19-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB