Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:06

General

  • Target

    69167bf41f2e8ea64a1fb649a55dc7c2_JaffaCakes118.html

  • Size

    219KB

  • MD5

    69167bf41f2e8ea64a1fb649a55dc7c2

  • SHA1

    95ad174cd12f8bb934f761f5a201f626221bd7bb

  • SHA256

    e562ac9ec6102e61dc630dc98a5a169a14dec33e36fec4943a31daa631b2cb63

  • SHA512

    e5ee88b53e804d48dfab436e37bc027b356dbc587ffca2a3b3fa742fd5d0cfc6713b658511bd23173d8eeff90cc9278b73cf0241b86471dae492776fd5f73fb6

  • SSDEEP

    3072:SBU57f2yfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFis:S2577sMYod+X3oI+Yn86/U9jFis

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69167bf41f2e8ea64a1fb649a55dc7c2_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2364
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1972
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:734214 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2316

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      343d7f1c7cb554723721b44f0caa4959

      SHA1

      778bc9b075e013661af73d4030a7719b5a2e64ac

      SHA256

      5063656f53934186aa0d02808769133ffa934039adbca118ac282697abddb44c

      SHA512

      cbc3c64d9be0ab450fc577e669cc1746a1fac2aafa600a64a80709dcc5ec3d8584a7f8aab76c56605b8789c3dbd06be840366dcd459f5664a5d69eb6c520d5c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      c2b2b652ecc6a3cd9e8040f26e6df4f7

      SHA1

      ad3ea18fd04906dbb3ed9b478a368c209c145b7a

      SHA256

      a26fc4a57375e89495f3cf729d60351811a006a884eb7aa4f6400301bff39ae0

      SHA512

      efc40aa9572586266fd685aa794ec170fc04a0da242b4586b953e8f684449dca63fb8c115a92c18dee784928b9940056066cac02ffc856f4bd9e5ff077b679ae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      304ce0429d320a9ca60c4f5756dc35c5

      SHA1

      ec3553a08b50027d465c8e8478819730a3a7967f

      SHA256

      50e656d15897991b89e82378c1ad78eb4c57a5ae00ca0813fcaf7639a48e2363

      SHA512

      2fcdb4c10a1b1d63aff145ff17d39ecb297b108d472059d5608ac2d2de28c0e1e05fc7c7ab0dd7bfcf9d7d6231d49b66ca11de421d6d3ac6fe4156e2e03aa441

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      06085df5e8944630d59c08d7570e4f7c

      SHA1

      5a759c8d3108f02c188294eac555598c42cd69d3

      SHA256

      2af492fd07371cca7a081448c09d2355c301ce94b2111a78703ee0b99549d1da

      SHA512

      0f662a51af1249417597b3f20bc9a8edbaae07062f2cc61e96ff931fca59d04442b5c9e67213b201ebe517bf30f387514a02545ada2ae4a994fb1b6113804551

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      7a7493755f915683a772d49b01ef4312

      SHA1

      90afbe314e980e27aa4873110ed5a0888b0fb07f

      SHA256

      d4b23f652748af9a7c6cd4f3c8b591adc55082e31b2ede0266499865943e45b5

      SHA512

      d02babd9eb113cb212deebb098760219081684c71aea35752c6ebd9d44840be88d70d524464d9353230186b3ba4dde0eeb15af9ebccba2ed0f9a698e0bfe471e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      155d1bb1aad63418926a683c6a371519

      SHA1

      b0eefe4f33c50158adea957891fab5e872bff813

      SHA256

      cca8357e4e1464d136868e997f4efa1acf4f759f073b846e468265518bc922ca

      SHA512

      fe9bab343020a1d1bb85afe7aaafd539a7ded07262bd18f075214e5732ef766b621e349c45751901a2525d8e0003fcc1ea1149d553dfc0122ebbef3567128722

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      a2ceece2486c3924f6ff307002ad6f50

      SHA1

      1e8789790f5a1b758c45a6258872ae344a67fc5d

      SHA256

      17e16849b9afe1c1f2c734cbfdcea4587860390a6fd917b9f08b9bea95689016

      SHA512

      faa1f6d885196fa49450e76d62c4f272199d57aba4a08e83025691a018a85ce43f4b12e94c7bad13d8dbd08c5b575456f2e16b1eb4a9086e5f3ecb0c6941bf46

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      9b072df25157aca376295a3df0267cc2

      SHA1

      5c99e5d3138800247ad69d11d3bc85d6d54d792f

      SHA256

      fc25f0821504666653f2bc3c1c8f74ebaee2548484d41d55dec9bfee03a6a665

      SHA512

      3cd692e507568c4c9376174f6bbfb409c96d62062fc668a0aafbc3d2311e13a4e7bbfa203870d8076b6b5db73e9e29dbd9375161336453bfe711873cef89e4d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      2b36f0012c080178772ab377fe0e1c89

      SHA1

      3cafaa943134c7c328a823cd9047abf76d18387b

      SHA256

      f2223670a4900dd401b96c84c364bbf3e8719cb79e5ad1962d0db22342130686

      SHA512

      b9827dc043c5684ecc6b69b5537d93c893d663da78797e3e4832c46030f429a47e5c6cbe67204cb3dd54065c545b17af24347084792aa106dcdbbaa29bce309b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      0bc8f2cfdf2938930fc990c15bb886ad

      SHA1

      b0ced81fc707522a41c8d4456bd03b26151a5032

      SHA256

      3c4e5142f1a0a26f1b3e78be0c7f0c02b65b4e7dc0c385695a8399eb33334bc5

      SHA512

      50f5e165ab9c87533acb3b8fb07006b600367d3f6541939aca928bfb5394a03e400afa988c4437cd661128dc051c3e9760270d5e2d5005b0794ef51e7440c50a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      c96d8c441d71cbaf5617512dae668bf8

      SHA1

      38c52dfc4547ee2834011d72c02fa8d3212deacc

      SHA256

      f175321a421688f6fa5d2bb760eb8f376f716d59b23ecddca9e29a62645f759e

      SHA512

      0158bb26f33159817a6c4139f41d943681ed449a058645c321d69935dd7cb25d373cdc0a14d18778b48247c426b9d973d251c161e6b12b9f2442f98e5987ce43

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      cfb5eb17191051cc905308074cc9d3fb

      SHA1

      17f9f6b6eda504d4c18bc1a5a63cf077eb33a8ef

      SHA256

      40c0d7ad2704d8376e8f9ff0b53fb41e1f908264f277151f7fed64b5b6008489

      SHA512

      91046a59d71537c0ddfa2bdd60f98dd8e5c006bbfd2962de4f148df6961da5dcb7938c8c8970e167ed88a6ac95036158ce89af663e9ddee97c497f167c8c6a84

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      ceacb0ba877803124c2f96ad14136ba5

      SHA1

      a790e2b9217aed00a0ff5cd3fcacbab9dca2ecd0

      SHA256

      fa1d1e92383cc31066dbfb52d4ef27843775c23bcf8eacf2045b4b0275d0d324

      SHA512

      c086f0a3654920a6da63220aa4d1b5c417879f71394fd5dc40fdc41a028b2c0644dc29ace6fd6f9116f91b7ddbc61092a2bff9533ae4451a4c08465216ea3647

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      fbd9170ec093d83313bafbeaea45c1b9

      SHA1

      847c98fc28648f765d608c820dceedb7f56b0d3f

      SHA256

      2c4741b922d8c8eb375dfe55037de260f1849b8e630c8184262546cc9ad81905

      SHA512

      1160d7e8eabc50401bf80d28126afcaa3640d7fb75d1cc3e7277ed3615fc4019b1bdfcd8e7be7e59647c3a772364f3368cb041c1c93a038f3249c07aa28f303e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      a97b994d4624d7451b6bd237a9ad750f

      SHA1

      a7a8e3ccb08d4d26d84a1b7f3e63eff7576cc51b

      SHA256

      7c0699630441984611a1e800ac3da00f97642f512caba73456babe6166854d72

      SHA512

      a6fa44b2ae0ee7d0d3a5b55862e877a654134f9a8a550e5a2c37b5fce4c489adbdf746f70eefb9a120cd2bd91830adcac45d4f9367a09a45b41cef1d74f368ec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      48e09e578150e21a54d8532c4d7b5a1e

      SHA1

      12282a1a689a227a375b586eda15d9aa5960caf9

      SHA256

      3ea58b16de36382a7bf7725c6a5956d06907018fc9479906f05a7a708ef0dd90

      SHA512

      f89d7e923764d272b66083f1206db057a6970a8538468fb07a87c22d247001da05b3b5ff147d071a169daf2463c166a7817182a0c73e89bcfcd074e44a7f44e5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      ee1ec2a28142b181119477afde519bae

      SHA1

      d0775ed0c85d200116252e7e8b9bc34036eec9e4

      SHA256

      f97ecbbaf0b3e197e0a479e0f9cc9aee08f464a6b1e53e07973d7122ed1b2b3c

      SHA512

      e24acd9720dcdb4d832d1246055db81352a4a03ab63eb2516dca782f7e8a562b23f22500b4b5cce7c396e72a86344b391684b8f46e2ced5db51b14c939242a36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      b5b28cc2e0f93efcdb4ba00c1f6b4db6

      SHA1

      ef6b8d6d709e0929eaba03cd5c0612402f84aa6d

      SHA256

      367a9e3cbe677f76bf3e55347fbefbe2253fc40f7de9b87e0af990a20c75d55d

      SHA512

      568b433bcb2fd10073f4e4e1883b9fee90cab222616bc1a365534eb818e4397e8a890a5a56d688027d0382a26aca009cb88dc0f09f4b233378339db69be0926d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      b43799588d781a7306943c5489acbd0b

      SHA1

      9b45366553418bdb952ef00be69f50f003f61905

      SHA256

      cbf4b55ce5f78f8f70da7d9b065b9e3f9870779c789395a3676ce23b16ba9b23

      SHA512

      11eb519909cf43bae53023229e224a99fc81c8693397e9825a0a5252ceb0902ba301490d82e8da48de0e2c73c50d0754b646081bcaad7706625125d823893ad4

    • C:\Users\Admin\AppData\Local\Temp\CabA43C.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\CabA52A.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\TarA56D.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      83KB

      MD5

      c5c99988728c550282ae76270b649ea1

      SHA1

      113e8ff0910f393a41d5e63d43ec3653984c63d6

      SHA256

      d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

      SHA512

      66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

    • memory/2364-22-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2364-16-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2364-20-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2364-18-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2364-19-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2364-23-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2392-6-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2392-9-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2392-12-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB