Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 23:48

General

  • Target

    6caf636c0dc64231f21314fcd23cd6ff_JaffaCakes118.html

  • Size

    154KB

  • MD5

    6caf636c0dc64231f21314fcd23cd6ff

  • SHA1

    1ea95c0978054fd70657d1a3d85b72460a64755a

  • SHA256

    2fe2dd0cbe0bf6d828748e139f533c9543e2f3e68943b25106a3cc443fdf7266

  • SHA512

    d1f53208e5076ff83af9e117615fd2f83a73137f01e52d736d825909f255614f974eb6abf0863a45cb47c4964747e61d5d520529f239a13644979dff85cc84d4

  • SSDEEP

    1536:S49GnVYQhVyhkmlyyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:S4aFVyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6caf636c0dc64231f21314fcd23cd6ff_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2568
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2800
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:472071 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      acfa978017b2eb321f59e1e6d47720bd

      SHA1

      09ca7121915dc3c0c2bcac9afef374a0972df77c

      SHA256

      425477b317d2a6eb607c1052e5a024f30fa633934030ae4a7ce3a77fd1cc4e90

      SHA512

      68c668b4e5e629b9e7a4ca40c42db1daab7e2e9916782ed9fbf7faa20bed2dddd86dc53ff74f130ae51e5a86104f43b16b2ff3f4439484454d8a3c7e33b1ae03

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9098fb72a9926f11a56824c318c1f81c

      SHA1

      2900a433cfcb34181d5df6ba4231001a5321dab2

      SHA256

      a1bc5792f1114fae2ba9a27ac9f854ee56777f5bef82976787c189f49c2ae4e6

      SHA512

      438d81f736102615979c0ea2f77744d2919b90cf02fa9883649e6760335898af65d0cc0f2c0b71db0f1fd2035809dbd9a674942d057cf1cc4870e8a253006629

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      083fbb830d84a579a53ee8f5d9145081

      SHA1

      e79facd49ab3d0502cb9672c43d6387d25b7cad8

      SHA256

      763724ee39509bc91d2cdf27aa1c1d990f786021565a15b52ab984b9b5e49e62

      SHA512

      8265601345a6cab8bf0f16d7accf4d1acfda664bd07b7e23d615b9bd286c6092e5abe8e5dd89b8a636ff38c2e47e5a641cb189470e6dff1319c363acb5eee939

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2251b9176bd32c2da049f75b85601638

      SHA1

      49c141e9c600e6148bb200655009fab076d245c9

      SHA256

      f54e14a4cfc2a82818ad55c875a9c9236d94925ce92b30cb6a938674d646411e

      SHA512

      f4eef7589149c9b4d4f801c1a1258343cf3401424c603e349293aa1ca3617efd0cf22433bd1e5153f0d44b863ee73dc42fd009b74df622402489317836575b41

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5b1d64cbf2dc3864ea32c83bb48125a8

      SHA1

      052d24e5e5547c31a82282964710457ad3e468c0

      SHA256

      df492e70ec6212ab5b96a56e6939be23da9373438e4f10a90c550d97738721d1

      SHA512

      dbb1f260751f916c870350adc1069334358306ea0a5dd7778aa335b51657e7177c7d870be59ce1e4113d1c05ae79561a382455e26f60029292c9ab8c67c9420d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d385fd44a2d98d804cdd112a62c03297

      SHA1

      28b0203a608159c6de818ea64d36de433e34605a

      SHA256

      df8eb2e0e7ef4bba072d9417e0c28581c4588af14d2c39d675b32e25a7abd44d

      SHA512

      2443ee6d635a833b00f87024b478ae8893ba92023581c4fd6c74bc0190b96419067549604a6e0215571d2fa6b7c45e51fb9ec179ab6e427e5d604266b03a6b45

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      be9494fef2b1f629d144a03b40e65ca2

      SHA1

      fdeeea994b55245fe627bff24353b7759a99a232

      SHA256

      c3439e7fd62b14fbff677b7c9566fea643b7fc33d5899b7975d814e772babe90

      SHA512

      0e70688144e85f8fe1a476df57be3e91d00f3460420ad6794433ff4255815586d6ce887ff5edc7b52842cb50b6af37f3bdc5b764bb5f7705d07b379190234d09

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      83a6c5b6f5cc459c48cf3dbc3de140a3

      SHA1

      33b2e2df0b8409076308aeda8abb5190c21fc9ae

      SHA256

      296d94157c295407c50aa497dab54cba685b3c6adebd7e324cc69db8eb17126e

      SHA512

      be37e7e083a050a68647e8fbd91c68d3f50d99382be0fbff37b75c00735eb57c417a6a94d551ae1b590c19fccaa2b6ddb2f990442e3e6345f42e2853b1702d4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ffc99a87c129be377fb1d7659ee6a783

      SHA1

      f5edc8e1940f7a9e0b89b76a7d7a88832c3eb311

      SHA256

      bb26d3f93b9b48e1ce4d705606ea565cdf95a4947b053b494607c82992804de9

      SHA512

      f9be659e7427e5ec9fe54ce33f46b43cce869826611b10c5ab2af2e3eaab3416366953b0d12ba642c08c74ff5fc5a85caf269be82371ff5d5951e022995d0b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a2d1a5b70b9773773de199c9210f6ad2

      SHA1

      4ec62fcf85f0ac14fd7704b3773d69740e3d6ed1

      SHA256

      3a0d20c303c5c842e07af17cff3a3423a539c495e278151c5b350489f7f609b8

      SHA512

      28e1885c27028342d96205ceb95aff52c038bb4cafd70f7b5adca318a43378b0a92f61fa6d43a93ce59adb1d3d64e4b011c16170772135e8dead6f275c96aeac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c70b2714cdc24face6355e478c0893b9

      SHA1

      9e78dcfa7669c54da57244ab71a19377b713f6fe

      SHA256

      48953c9df07b111aee78ba562ee2b2dfcdde284c69b019aa3c15d9b710bd3236

      SHA512

      630a457e171f062854a38ba57fa0304cccbd69580a983a0c8479be633fbcb04a5f966f30862586b7a573199dd21847c85d4ab7b183b08d0184793e5a427e0fd7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5936c7d1b4103dad6b42b870fe79bbc6

      SHA1

      74409fb113f3ad29742337b29e5832c0d747f7ce

      SHA256

      0728ed1b227d06a8ff494370f418b0da651df27899aa89c67a84e6819d14da97

      SHA512

      88e288a2b4f3518a609aff41fb74b4f1f01065e861a1455831063e200928fd60106e1551c3be4abab383fb1dc43e1902d5f3c8c7f779332c8bf82e8db3027daf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      828693bc7b834aab0a4e3dc5320b9151

      SHA1

      88409c59305e7414e83270bc92d476e424d73a7d

      SHA256

      15a8407711c7965e5eb316132c885e372a8ddfc9d09fbbbb3d078ae5fb339d88

      SHA512

      6abea3767b7002fc6595ca399b430e289fb11edf09e7034869e8edd37bba8878a18af40175370216f94a57ba9f624c5770b37ed6b12565ef9f1f62d98fcc7769

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      dd2f6cf30bf16e4b07c85f1360755fc3

      SHA1

      1bc370756dd1755bd2440121a2767e720250ad0c

      SHA256

      1ba7666c9468debf4eb5c2c7986cf0ddf28b075ba2dd0872c66fad34b04f9abc

      SHA512

      893454bcb40481058941ddcc69c69586a8a6977694b715a32f5816396d909983ea8bb0580b594cfa6c5e7a4bd4fe8425c3beca5798c7cfb785f9d6eb41c09143

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e233713d5a7e0e4382fb949369913779

      SHA1

      7c7ec807eab14984c65285fc2c10a204a50ec2de

      SHA256

      ecc2aa1f49c5162331d97e6dab5c5a8937e01eae3a51916e1923eb612b958eb8

      SHA512

      287c3b6808fd2731be709f17e79aeca1fef631bbe76dd34aa7c2a61f1b09f6825bc04fb8b09f030d58fa815cd095efd6033e60bf37ae7f773481653d1d670a27

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b1c485edd5dc35c151c129aa35066d65

      SHA1

      fd81230f79c23a3b1006e79a6ef4e7a410bdd2a3

      SHA256

      0ec8ede5d261520e8ca2f41829473d5aa232cbd45264f05446f2dff61512769c

      SHA512

      769d3639dda49806e6b2d52dd7c125c17b6c5fe5abe73ca955ef55bb6263b8e1f3bccbd8d413d8b59fd3bc4cde1cd17eadd609e70d9b2ea8414ba6f3f0755a94

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9dc71608dc36bc8f6cc002129196735d

      SHA1

      1f839568fa3aaf3c2e9f39617045cbb0cbaf2660

      SHA256

      eb1a85b0c74f5fd8301e5a582d74e0210b1e01a4528b7728380deb8ff36be95c

      SHA512

      ef102b2c8b75145d7a22480c6a9463f4a062f7852beddab77e58f3ed022c0a479cfae99a38b36ecec5d4171a414d730b4085027db887f0c9a055cf1b10ea12a0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3e24d07bb73d53af3d4a685e06dae013

      SHA1

      3e972bfc9fa37ac8e124b9ca6a433b05a99027c2

      SHA256

      ee2ca8a43d573140b6f43361d0380e2b22f52248a4d8095cbacb438d4ea624df

      SHA512

      aede6a2f40e3d759838171ede7d64e39f65454de1059897a9e61ddb5dcf397feeff7eb5c4ce7103670bcfe1f8ec900fbe48f218dd59ed7af75f9a771f4c1e31e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fc2ef172bdf933ebf7e02d3879b1d165

      SHA1

      d72e1316326b7eb713c6017bb3bc0d4b91625a6e

      SHA256

      4a88936929ba5777c4dad868f14d69a93d5675798fa3ca3509a9acfc933741ac

      SHA512

      f7031fa84b27a4ffc9b3c17fc1e8c9fdc32e01555cc7aaf542496d3b044775193b5e3cdf121ca41f0bbf12967bd44d656738e97d92982731a7a446a0002d682d

    • C:\Users\Admin\AppData\Local\Temp\Cab2D1B.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar2DEC.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2568-20-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2568-16-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2568-18-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2568-19-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2652-6-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2652-9-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2652-10-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB