Analysis

  • max time kernel
    137s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:59

General

  • Target

    695f2dca9e294b2ecdd140923c7004b3_JaffaCakes118.html

  • Size

    156KB

  • MD5

    695f2dca9e294b2ecdd140923c7004b3

  • SHA1

    55d6abcdb464d59b2bdf9b65eb593b6e5c47ff79

  • SHA256

    fff972dcafa0bc1a8aa7a659bba3195f021b59c2fb7ecdce2bceee347ea9cc12

  • SHA512

    5aca9cb43b5797481ce2a04ecb00f57bff6245e73d02fdbf68b173f09b77cca4cd8b6c835bf42e9f8f7ad16775c7c81e798fe9e57554bf4e26992d7cebe033dd

  • SSDEEP

    1536:iNRTcD3p0iLGoWHMxzU5yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:iruIz5yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\695f2dca9e294b2ecdd140923c7004b3_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2396
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1040
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:928
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:209938 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2320

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c06b5128a3fcca9c730b2df941246f07

      SHA1

      bab002c884290049c9ec6cd2a846743074059561

      SHA256

      292221d742b3fc232494a35fe4fbf846247f6afdc3a1d7f19515eb6a049a0092

      SHA512

      880294a87a3a42649034a0ff0445fdc7b835823d50910c1372fcee862a8a5c3d3aa3fd7f8b94e41ad126c641c1c97223f724ab6aa3680efe33a21835b829cfe2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9e150d49090559633a9e1a0a57e6a2c0

      SHA1

      9923db737a6e136b9a9ad51ae7a3ba15bbca437f

      SHA256

      2bf9a624dff922de0acad54c2c0810f9e42ec4220c5f0f13466984ff812652f2

      SHA512

      d5e9fc9653da3235f2015a57e67e78b928e6b4206bcd91b1832fc5628606b8cb139d5d47916c247e56407571700ca090c06d8c45faeadc0b7bded47f75c5eaf6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b721202046adb83128979d085e69fde4

      SHA1

      c1e4c628a5607abdcba7eba659a7a4139a7c54bb

      SHA256

      165e1f4390db7706e64cfc54ad9184681bf650dee59423674aaa8ed9894f420f

      SHA512

      d05d39529474d9185a57877fdd80610fb345040e91407196db1869a14c4b669344b4312dcac5c38fa4c36d8eeb78490fd3e4ce93d239ebd97b3290305d7e8709

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9cf888e502b11763b3a06b946471313c

      SHA1

      713d6268692f1e578262419762cad0748f42e4e2

      SHA256

      16768ece3d3a928caa155242707399ce9802d50f544fdb5f58c6d6be929a7968

      SHA512

      a67807d538093ebaff14adffb6d945235eea91925baf7b468c28c737ec1d7535526cab819cba289bd1fffdc070fb9cecb83480541e2702384929c777a076707f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1344db5e0ee27be224f7f806e18d7e4f

      SHA1

      aee571a95d7de0337c6983d22d353b8821bfaba7

      SHA256

      48d533f898dccc8a6372159f417fe0f4db63ecb71b210dfeabe3817b6f9729b7

      SHA512

      6dc4179c21c9c8f929eced38926b60536d16b2345dc96f6241eb45f4c32e938875b3a74e81ec075de6b6b344c21950f2e58fc617c59e99e01bfd44418059fe6d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      833e64253192b7a2ea01f435342b536b

      SHA1

      e0479480b59e446e94a40c9a1429d04c253f9a80

      SHA256

      b0d3c42cfa6decd0fa9de64c2876aa56f036350bc63c468b7d12bddc91f5c329

      SHA512

      41e5b19bfaaaadff90ab80b1cfeb5abb2dcbbc83b937e92dd1e199a678c2f775f1c8dc01bd09a4c48d7dd9889eeca24888367136f22b7be298d25bf3235c824b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      686f5d1dc6d8efd7eba6b0af852a657f

      SHA1

      1bbda26bb7f2271990655d6475dfb4e71bd728a9

      SHA256

      d87d326f2a2104cfb34dbb0d88abfe4753bc88bf0734e70f3365369c31e7a972

      SHA512

      b8c678de21b65d6df99db5cd29fd112fcdb3d8109b1f0a8ce0115f4169fa7868cf0eebdb961b16b5b8590979ec2ea2ab56694a207c61eaa071567f2682c1d24d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c70d091b7522a6930f5aec8778bc0540

      SHA1

      a197b62966228ee397e731023971cb14fa68d663

      SHA256

      da70bbd4fc2ac4ce86824054a7ff005d35306869f1e9d0dc75e7e31421510a39

      SHA512

      ec283a8c697e22b446c9875546e859d0fca511c6e5b876e3ad398a533ba74e26629265d9db212ed10eac2b68e9098afcb77f17935ebe8526a81cccf46f8c83a1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      52bbfee8f21ff7a8390a3ce6a142ea3b

      SHA1

      7a76f75cf5ae2c8ac1f8738eb17a5be57b459111

      SHA256

      94ccd072dba4f3281017a5c01d89b14769114743fd84ef28895f3d7d3a55484d

      SHA512

      146aed908c7ef3d4de1520a77af8bbd7ea349b4bceb04320e32d7e3eadfec7bb2a15739e22cd01d6650e5958e7110863ceca925e431da40821e2e8608d9d18d9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9d946f3c799f114796341616677d7743

      SHA1

      cb2058b7d2aa00e12ed9696431efe1e57fc380d5

      SHA256

      d8dadf05acb4aabf2a60baca85e24184a31a785816f3787e8c685340f4546260

      SHA512

      6ffd2e6deb5fdbfc5ca124fa5d8e61aebfa3ffcface2ffb644c83dfb0e4b931108cc54a1d38a959dcdca6097ef140e1d4459179424a416cb1bb5ca4adf58eca4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      aa36ace499213c53cdda38a8539af815

      SHA1

      5c28dd9bd3ae21fd018a5828fd45d4a24b1635ee

      SHA256

      65b7ac5fdd417bb5d0dbfef7b1313b68d2de8d64ecafd71fe733dc5242f1b1f6

      SHA512

      47f878e0bae91fcc857ac783fc29864f6467005eeac1a8e4f09352fc8c8faf0643e57f92fd17d4c92e2883834df40255224e0b26ef1495daed3714336ff21470

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0fd00fee6519e1221ae627517c42f110

      SHA1

      928905f9867128d79b26f4e016e2586996cf42d2

      SHA256

      8e7b72ff951ce2ddfe7834b2fb9b5827743cd60a7bc6bb80d965b1137e6cd46f

      SHA512

      4dffe0446f06a8a04c63973d04233412ba5d30ee50e7deab8a388f0370eb4f6c25939d826ffc8623f458544a3a4b983a8dacb3f264a188a968de613c601ebb00

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ced45933e4d970b9c91979df12c3073d

      SHA1

      6b3a1ad5ca9359fb66dd91c782f37c48f537c231

      SHA256

      aec12a7ed3ef9d3a5e281a036081aa910966c948b09a836dd6cb9c2c6265d16c

      SHA512

      87c5409df2b0111f8586e12bdd99c4246bbbf9d1794cabe73bacf0c3ee4512ff386efb576f2f723cae64a35064bd0b52ad14cc759bed3dc8b6d55459827ad362

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c13defef5bcc34b0eee0b90fe68eddc9

      SHA1

      40b6097b867c0ffe5055f157a8c4b459ed76c5bd

      SHA256

      9ca969857c83e83d71c025ac1d3b2e2ca35d9a844b362a042ddc1504b4c4bf2d

      SHA512

      bff40d21084c5c8441b7606a3a2045edbcff0144363e238b573f6807bd666f35e1129f46064cf56646e6e1d85535c0d2aef913ecd01e5105ef96e42f62a698ea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9be19e532866bbae6c8333ba36e67215

      SHA1

      788f474cbf821c26cbe48e09af2278cddd3d2579

      SHA256

      6b00a7ca25e2f32726efe798cb347f7fc1249d4b51577f564d1b44611f249fc9

      SHA512

      b904e481635bce0ee6557ee947e3f660eae4e9d755373d42ae2af3d6e726083eaf55f7cdaadd479e8219cc36084cc48f6910e05f7e93618cd084195562f2ecab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6ebd1dfa8a1db0ff4586a96cc5634a45

      SHA1

      34444ba78f9acdebc3787dc1927765e7c65f9ba3

      SHA256

      43303efa0fdd9c7c546c4c6f74f551558728046b74e86e94beac6016c89f0733

      SHA512

      3ccd8930831504a0361f7ca8ebe3c923cd971740a5a2eec52f97c689ed1c8f7eb630ee92f2fc689ea5012277b53604b9ee99c7817e03be3f53963e7f729e1be4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      63c18b8f8302c96779c3611658740b7e

      SHA1

      50cd29c4fd476e06ebf1c2b16517af7cb0476930

      SHA256

      7998ce690741c18b495d9689c8d8a78502b50238cefa8a9bcacdb385c4e77ceb

      SHA512

      31f5e7b46a9ae5000080b6d6a975aa3b4205f9fea34ebed1a026ac431173a29bda4d09710dccb834c2679471ca0dae63e21f1ade7b7c815c9515cba5bb29bed8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e8c5fb40a6a10482941af51b44f420ff

      SHA1

      763d75935d20e66b72e27c57003d5099ff8a6229

      SHA256

      95d21d61e8cedf71eee7fd967600f066cf345859f0793135bf69ff92c05f9d44

      SHA512

      9755dfbd17530051a67318219f6861a9a02b9168e5be7118bc5ee3c879909ad42545461db96f075719a492c60d75c104b9cac488517fd37e577bf8f5868ba262

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      78f595d64cdf0c2cd60b04426fa4a5ba

      SHA1

      43306e98b0ebacdc3bc66d0e9d4b9dac1cf6b1f7

      SHA256

      5b23188dd3d0cdc6fb8419c6b5129da0ce6ad522ea5d9be25d7f6e4440013e57

      SHA512

      edefe2dd979187e6be2e09428372ba16212619aa7bc1036e4ea09976eb8c4a8ccb6f4345e975f519f122ae234224778efc4785a11533b736113957e6a2e11e59

    • C:\Users\Admin\AppData\Local\Temp\CabD8A.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarE5C.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1040-489-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1040-491-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1040-492-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/1040-493-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1040-494-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2396-482-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2396-483-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB