Analysis

  • max time kernel
    118s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 20:37

General

  • Target

    688baf127622c2b960dbc6908f10b448_JaffaCakes118.html

  • Size

    133KB

  • MD5

    688baf127622c2b960dbc6908f10b448

  • SHA1

    f62fc793c7a80b65d4d31ac512c5dd8a25e8267c

  • SHA256

    1d06f0fcc6f647e6c3bd8ac85989ca579462d69e6319195029646e81552cea71

  • SHA512

    be118768a09ff4183950fcc66a9264f4fe29b747a4fcb32ed77065b474cb5e67b8786c50a7fb61996bdd0bc2834056f77f71f031a2ca80e160e2fe4edc5dcbbf

  • SSDEEP

    3072:Ve8YsD4wSeyfkMY+BES09JXAnyrZalI+YQ:VJD4wKsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\688baf127622c2b960dbc6908f10b448_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2952
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2660
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275467 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2488

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c0db2f91952e8906a9d15de925d5f044

      SHA1

      601fbe7b03f44077f274cf2065ce29fe73a4a694

      SHA256

      71a8e19ca63fd5b2b07e100cff860152ee791487d78d3afbca89ae07a43db242

      SHA512

      85d7e0abdc3348fa60ba655065f964ac87d86139ce6272aa2380d8a7924b11622213bc88f6617f0717ecb6f692b4b0aa38128340ab3e544ea343ac439688eb5e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5f18cf3fbd557e7ee562d1c40e14714d

      SHA1

      7e6f7741d13043cbd965b96513fc02b5256a155d

      SHA256

      3080a6f9136e343bc03cce1fec8e8a8d0078a92ddf6d194ce0773c3e365f51ec

      SHA512

      8254a5646a56d6f1658dc4ed3ce24f6fb330c291ea54b7d6c326e7bed806eb54c93be0333761808ab3bc6bd8b50a4b84d88d09fd21cf9cce3b0b1a60bb5564ff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2417d12378f629a52004a2e17c3b3673

      SHA1

      ed27160d5b6a8b05ddb00aa78f91ae666d5a6f32

      SHA256

      aad00eed69183c9ecd4a1f4c83dce7bd5d5490d9bfed3d1cc48be997466a03f5

      SHA512

      d14fd51d972a6d1fb85c56691a3a42358cc8acfb504435d57407a9085773cddb88bc8ada0330909ce71010b15869618ebb44d7167d0925924dce3eebe530de7c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      430f7e36c96c6c23253b2c43e32121c0

      SHA1

      fd721b37cdbdae3d2c5a183b53672a989a2a6660

      SHA256

      b211265598abba5360ca5c2457b724cd2fe91a41225a4839893c118482cffbef

      SHA512

      27aa7131e6bfb5747006d4162261da33c8c52ccb8b9586a0a10d751893e5865def9422a8867b2a03cb641ddb13af88e6446d2fd0fc2aed6eb1b3afc2f5081c41

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b19c2da020e3a55f27373d0eb525c975

      SHA1

      dc78741063c05d376af406bd0da936f6ba065301

      SHA256

      5333e92e9a6a7574341769817ec065d59a767e2830902fd0bc90bca7b461628d

      SHA512

      5fe156025699d489b3f364b282873f8fca324dc3e189255931e217c2c84ae001fd5fd5978b10e5b0baf90ede9e6b5c8a0ed75f4b27a525859daa72ae8a38afb0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b152cb94194b26862d013d45ce978f48

      SHA1

      2cc52622f46fb7843bf899debc02ad357b40ab85

      SHA256

      2c0f34f8e318b83d628e44961adb3183d997d6a58f213ad1adb8d4748f61d5b4

      SHA512

      934b0837e0ff9ea8ec168a575a6dcfb93911b2f495ae8fdbd37cb4ca1121e5be8caa3324d44006fcf21beba55c605981858c53575a320a632f9dd49dc9e436c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      197c8ed4eea42eda4ee6fc20be818670

      SHA1

      1b7a925e0b4d7e08d6ca10f06697fdc9b16a2679

      SHA256

      41b1c98fc07df9ae259689056d20842cf0d06769e5016264abdc4e0bd76083a4

      SHA512

      2ffef893bfdf35cf6465719fe4de8c5726d6e4c59a5afa3a739c05919edde246f5870d0eebd7fa8ff3067c4a8ab0c7be51b986215abdd22db585b72555676def

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      19163f56451b09bfaa71e9f5166ac205

      SHA1

      f3ca7d6d0b3337f412da348c921e3bf8d945702e

      SHA256

      77a26340431c4ac58523a07d76ce8140eaf55ab4d8f61357c044448d15128548

      SHA512

      8b8fc131ea3d1545bc89db4957155b68fd1b8876322537bc1ef00169707575e3f0543aeeae2320e91275dd07f8c23bb4da6c0923097ec271a50eb6d3ca3d3501

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      82e7005c0932aa5a8b837945c1b7f9ad

      SHA1

      85b3c2526a904ed3cb6fa72c92c86256ade010e1

      SHA256

      49a44219833579cbb5d619404db4206395895eeb860d4b93abc2a569aa93f2a2

      SHA512

      1a3630c6a413e3c39e594ae0e0ca66208269c49f8b6f103b674aa16360c8acebc0392a3972f0ea614e4e17841b72f3cdca859da5ee858a2e4db94f7f10660fab

    • C:\Users\Admin\AppData\Local\Temp\Tar438E.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2800-8-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2952-17-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2952-15-0x00000000003D0000-0x00000000003D1000-memory.dmp

      Filesize

      4KB