Analysis

  • max time kernel
    139s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:40

General

  • Target

    6952a7e0d0e2bf001426c4eb87b05a00_JaffaCakes118.html

  • Size

    156KB

  • MD5

    6952a7e0d0e2bf001426c4eb87b05a00

  • SHA1

    c019b7e696be807fa46038ee7a635daa4d090430

  • SHA256

    61ce28217ac8a6991a0b7dfe7dc1be2163354e7a21bdfd29bf63d8701cb12cbd

  • SHA512

    bcc03f5d6b0fefeb52a914e1420b29f8401677da1552bbe06fa01bc539289f99063bbe5edf355f96b06ca28d1dc564f9f4776368f47133cb896a09aabe9d6f19

  • SSDEEP

    3072:ir95Lfl1vyfkMY+BES09JXAnyrZalI+YQ:i7Lfl16sMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6952a7e0d0e2bf001426c4eb87b05a00_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1808 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:3060
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2148
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2204
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1808 CREDAT:406545 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1596

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f5e2239ff78a5bd58a163c77a342b68b

      SHA1

      d900ace94207656265507a00cb56d3a44c7cc5bd

      SHA256

      6d2b0a07e7a79393856b45776206bb40ed26e982a6c21bea654f5a5505970b0a

      SHA512

      eaaa33eda07c27d41e6ab2d7bd3e3f9e20b5516cae63d496fd75410add39e2eb32462a1c29d6377b12efbd38f9997f3c492366cdd6b7bd715e2b56ce167a42ca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      dfcc4d6de267035669c483c8ec2473ca

      SHA1

      a413d0422a969001d7bc345df441491fc024b806

      SHA256

      24a51607ba8976b7cad348be09fc40e04caf42ddbf85fa4c752950cf6c313130

      SHA512

      d990c7e1dd64867b87f4507e20aee736aa7f30ca85dde6ca6c570574d7b4a713528762d7b246268679641048dbf69f004b838882f1448ab20efe51b45155a170

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      99ccfc7e3e82bd9e7628cc95384c9129

      SHA1

      f99dde37d678592cce842835036bc8a62a2d443a

      SHA256

      b877619644e7fb40963881398f635aaa13e5b2adef0607931d4dba73fa78362e

      SHA512

      23864fde407e48774f00545bfd6881af9a4f919be659f979b2b4e1137cfca61b257c188cc5f983baa2e9307d4ff6ca9b2f4fda8ace90ae6733f834027db9fa0d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cfdb8211327f6e1ad95df40d6f089a43

      SHA1

      9697d728e40dafc23f467ff7057b99d1f85eba49

      SHA256

      8608ebc72bdca43c907dffe9ac1daa081b9f4966a462d859364843aba1efadf9

      SHA512

      160401ba297845d6fbc16242a882ea6e08b5a183c51095ba9cb0902bf436fdddb0371b4a6693632f087f2579b2ffabff8e1479cd1d7b83ac470c70cfbe7f1c05

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e12feb27907bdc3ba5447846bc843927

      SHA1

      d842b6f293bcc7930aad8d945a9126f79fbb1ef5

      SHA256

      66ff279d0268f74dd3c345ab92bd032ced5f5d2a473ad2f717ceee5ef7be66fa

      SHA512

      8b6889a9572d57fe8514af0149f293f67589b498a0089ed02a8fd882e7d18edd72a73c7cb7abed1985e7b0c8bf36a9c80f57f556091b8656290f50770d63f191

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      480321a7a1712013c01d393f01330df4

      SHA1

      7379d2de5104ee9bccb9b0b985e93b11aef3bb5b

      SHA256

      fd9bb501c5f42bf94a77f9b0203525eeeb88f9e24cfce0d7ca3870f46191d6aa

      SHA512

      341812425b5572eaad975da84496fb9a11d85ae0c04dd4cd28d77ce018360345782ccdd868ad1c007bc90c89ef8f466f5d8ad622eb7a8c40b22a8cfaee78fbd2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ff8e23fa46cb382c07a439653efa8769

      SHA1

      1bc88205ac2bec6f9369a10d6b4bd3595773ea3e

      SHA256

      bfe44969aa42f37988adddd050ae58591a390784900973871135ec49bca04c1e

      SHA512

      d17ed671ea4da3a26c2130fd6c88f7c6d95455a960369a81dec5d2aab95952fc0220f5ebcf4f51862a5ac4fe661e53843a2ec770a664ea791c6fbba8a078a914

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cebce33163e4f3a051c5eb677e388544

      SHA1

      ad4ab99a457aea192c5413de9b48498aee7e5572

      SHA256

      6c984db8ae898d861db62815579d5a0bc80074b46b52e147a346f22fae10e25a

      SHA512

      b9abeee99925f55f34a2dfad89c9a3c9e3e31e12402797885b896fd94341b3389f77eecd719d62c746032248fed50c688fbed9c07e89ed73d6fa08c745f7cd3d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4e1cdcd0b63c9b3f59f4b642a52afced

      SHA1

      2ea5ea4b29b6e3323816cc710fdd07bb334de562

      SHA256

      3fd3e5fd449e0f927261ed7e373a541027f93572849bcbe6c780994b7e561d09

      SHA512

      6f034040a62d38198029ee85d8aa89ccbecf5347234989a1867e9a5edae31073ac30e862df953eb7f515c0c19309ec0e7ab9c472cd288cc5d60b80e839edd86d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7e2fa3ab573edf6de59a03b656edf888

      SHA1

      4b826e5d895bc298bf08e37f21ba5ad0e08a43ca

      SHA256

      8c32aad38d6050e2c3c996b6a601a9d05806f3e34e968bdf4d66e81ed4b976fa

      SHA512

      3c2608c6832c36801d7d6f6bd8eab4a0db2f2fac47b32401382ac1e83ae634da9af73f03551258648f465576664e1b2409bfbe3dfec6fdf39e8b9ec3be5ed76a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ae45d16fba0d37e21797de821ffffca5

      SHA1

      d04f173b646e9b967b5c6dbeb70b9e7a4e883b3a

      SHA256

      c084d7312b2f899f3cbffb8249c62046368855f42359b770dcc7b49d9720679d

      SHA512

      9f177289609ce1bde38a6bba0cab9b61f2b086b74b6a12734a9454bcf188675f9f75c7d8e22d562586e6bb5d271e0d748c9f150398da992396d5c67a651a9cbe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9d2eb2e1886c37ec42db7a5c1ecc43f7

      SHA1

      166982f65fc43bdc30254de64f878dd186f7a82a

      SHA256

      c6ed3f3f85981481f3d15bdb232c4bc5f9622361935967336fe2d1b6f372a568

      SHA512

      9b12692be67217fbcf00f9ccadc74d353039d4af96f17cba7e1117c34a6a397f5a848f2dd6a208bac8890b92bf0be87fdb4327267c08d7da8418c801433f9b7c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f9682a1cddc726a67e14cd0e03998bdf

      SHA1

      e090e5b7a798b26c72a66c330e70b9e58479bb62

      SHA256

      1e8cb562a751f373efbfc13bf5154d8ab3a426647075c77430b49d201f3e72a0

      SHA512

      cbb67460f0a4d040f304cc6624ff1883192b19a0b5cd0b04f802c99e049ff942bb47d4f8d08c377b3f8e1c6f13723ed3e73121dd6acdc1bb63e166345bdacad4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fdb76efc696ca01f4cdfefe57b41bf12

      SHA1

      1aafc34977dfd952ac178e4ed08519c74b2648d5

      SHA256

      66b0631f3d7c6d92b9d27341a417e73154dd6d771c95db1bd1b356b82bd7bf1a

      SHA512

      10dc3d3086d1bebd85999ad78a166fa135fa7a5afed96aafe9c43a1e9cc7a65eeb45a001e66331611dff9089b311d4f74b7783518274c88f7da37a912af28236

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f2954ba3bb3279a61ad6325f6c9aacae

      SHA1

      d5bda2358ca41364aea00bc2aefa9ea300dcaf06

      SHA256

      90c63bd6de4e309f3214a25487e75033e9c9d68efdcf4874205142a4792cf95e

      SHA512

      be15c69f5e7e0ad0de13f783dda2b4f11ed792464af8f6a3a1af6fb9cafbe10ca3946fd687294f429281020eb55f6924e52fbe46f315894a47dce3c5f576cae7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      070a752b9ff9fcce3b6fbb1c7d777c4e

      SHA1

      fbabd272a1b67700c56a04eb1f0a52a61e4e32b7

      SHA256

      4e8fac0ec01f0e677d836ad31f5605d9bb7cd4de2a20b4cc0e7c7582a6162956

      SHA512

      79d4f7a20a7e7dd549cc609c484e6ef2630d3235980a5b50b53149c9382a6de52079e576bdec51f5070bcd3cc4353a54156b136a187e0d778d6fffd903c913e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      afb0db17bf407682d4f15f3c70455575

      SHA1

      3fc8ea84a0a147f2a8488ae1408d30501ffffef0

      SHA256

      416a246cd15cf09eeca30a5e359f798658bf6099496e3c8675587ae9f9c79058

      SHA512

      5aa516dede475b361c68f27eb2fa26fd147fa75a57fec8cefa8babd17afb1bffce77e1f0cee28b0f44520536f36fc1098d2f9c83debbd921eacce042075c36d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      97f08604687587071d2fed0be93a6026

      SHA1

      6b9bb1ae169daf0180ab140306568be03cd9b82e

      SHA256

      e4a6c59a0795c3e4cdcc407930dcf4f18b6cdb42f36e86bbdee7ee944831fe73

      SHA512

      755297fc6bafa9541f605fdfcfc3a72b79d74a9f33ae4fb8af9e73428cd65df5be8b486e295acfc79a27c8183e724a08a4949dfefaacc11345b74b0526501322

    • C:\Users\Admin\AppData\Local\Temp\Cab1576.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar1A8C.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2148-494-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2148-492-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2148-491-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/3060-486-0x0000000000250000-0x000000000025F000-memory.dmp
      Filesize

      60KB

    • memory/3060-480-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/3060-489-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/3060-975-0x0000000000250000-0x000000000025F000-memory.dmp
      Filesize

      60KB