Analysis

  • max time kernel
    131s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 12:53

General

  • Target

    6b0105dce7e36385e5cdd86b34371c84_JaffaCakes118.html

  • Size

    160KB

  • MD5

    6b0105dce7e36385e5cdd86b34371c84

  • SHA1

    3158027ba00489a32f099652984fbb41e7424a05

  • SHA256

    5b4a839123e2163052acb0817ef3624041269397d1c18e3d9475cb1916617c26

  • SHA512

    a2246a4038b508793c4a80878e1eed4ef4bd92670cc77315ffe9174af7363086d088c04588121b335fd0c67da8153ce33943e2799f16438a882f15c23a04c4ed

  • SSDEEP

    1536:iCRTUXt7z+6lFDyAyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:iQel2AyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b0105dce7e36385e5cdd86b34371c84_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2232
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2568
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:406543 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2664

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d723bf627b3b1533d79d4a48a7889fb8

      SHA1

      225aaa4719d7663d361cf8ada4a729b4b2f75717

      SHA256

      4bdd3fe76af37fee2acb27609efa31ab5ba718efecd57d72604ef9f056a3ebe6

      SHA512

      2010b3abbdac97cfa6cd79578506a1078f718281d671ce45dbc76b0290eb4a36230639f5fb60cb6e4653a96c47495e9555e1f961a03156143dcdae9e5b36d7eb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1b8e04f545c688fda1bfa9a6806bbbe4

      SHA1

      71893e2db4fa4f804ae585eeb012681bc6b0640b

      SHA256

      13d680ce233e9bdc9e1a526fab2eb96e70ce953637e3e6b72351a4b3d937c609

      SHA512

      5d86f50358946004b0fc7c1ab418ce4866dc1aab8f2fa0e3220697d09eb98f5716fe834bad84f9dec54cfd7bc783e3558959b010efea997a1940f44af97b1667

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3100d183acad34bb0550e16c6f43a1e1

      SHA1

      b5decbb4ca7775def7ee25d4338cbfb5478755fd

      SHA256

      d4f6068c85f53053da4178721658b27f878ab89f088adfef7e60c26668cdbf3d

      SHA512

      2e171c00946fb898e5080964e9e74656199f8e46eb34808e1666b50585d6eed24700e69964bd1c06a811d2f869a47b395e728d90ab2c2ea937ad7912b808e507

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b3a445fe26bae203514fcd65cdb50105

      SHA1

      b37013f7db9b6a37bb912adcbe4c0d7302327c67

      SHA256

      de17b718fc7c538d73af27d341aad39ae119c119714ddcc84cac7c505d3c3d29

      SHA512

      efec2bf58a1fdc8e9392a1e178ad4e2161cb66393b42be8c3f90bd6795b04c73ac878b6dbcaae3db9a679f5de6950226f9ac9a17a9bd0d156956f21ec0871deb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bc948e0bd44b79e8742f90df22806326

      SHA1

      e9cba29334ad70f82b831b4459cb723bdb54d9d9

      SHA256

      8f0bcd6896ffa8b89005494bf61ec269d5af8f06ab5c515def3a30c6a590f4f8

      SHA512

      b5f85b3e01267f0f396b23b68351a66bd9724bf6dc1f0fb8e320d20324503c87a008cbdba6fad0a81173dcee2c7b7adc19a8a5a171a23c2ee1a097e2360135a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b3f1f4148ec11810dc3f7e4387737fa1

      SHA1

      f92177a55421ca58b77314e9124cedc48019fc42

      SHA256

      3ac0aa9df7a5255bd6ba11e152d51b91f023eaee5cac4080608023c19679445e

      SHA512

      962d3af2f3a5a62e0ddc7bd3e844473106d5767572513e7ec9f229dae6591db8559752efde5ce6f0d1d5c0b7524653a0b9e40f14944e4e1ee73059eb405198fb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6d20423d8bc8a0f5f3bd3c2345b8b773

      SHA1

      25aaa8cdcca0eabf229ebbaffaf769be54aabe52

      SHA256

      777b448baa2c0fe8106b473436083fcd28d0dbb0e6c5cdeaa01eef7637c3a927

      SHA512

      4e6ac7f47407c4f04e2b33afd72e5cb25b7c4ec0e087afa77e891447ac860f006cc49c64c722e2670f7c942e685ab4eac8c6e8dde3b8adb261f20dc0c09d1a70

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ba1595fbf32a3f5e553337ae31ff949c

      SHA1

      0bef284a324dac8b58af16275227af687e543ad5

      SHA256

      f179cddcc1767a3d016cdca29357be15175f26df46d6b7ed713d31b74b8397ac

      SHA512

      45f5dc69184a70346963f10ff77910398e30c31133ef4109e9f0ddb6fba00f4468ea7b6e367a584cad45b4bc584ff5ac259e4cee06483493e3fbf1cd359c9f44

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      071717942c6f368460351bbd21e7a8b6

      SHA1

      c55347ae9cd21009276e10f514ddbc0dea142d80

      SHA256

      4aedcb34be19e1dc8bf8637e89d155f951c0db32b65440a39cfc90366f55cf9a

      SHA512

      f2fb61e23ac1581e5be7767ad4aaef9c2d96cc6d393b3270f030b273b338f468b69f8de69dbb7bd1f90573fe5928504ae77a54ae4315d8eea9dc5dc60e7bc6ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      24bf52dbd87ded3e92a5aae87db7f1bf

      SHA1

      bacc94531ece1eb278d84a8b1f45b617fc8f5ac6

      SHA256

      eef548fc279aadafe0ade78ee1cc88a6863dce82ac92f4414644a55b02a7854c

      SHA512

      4f1bd804915aa3b6eb662b9f61ec15eac9a7eede121cf893a5265ab59c1c905e9bf7587479c4ed9f2cf08cd6d1b2f3f8b6e0d534cad7ec6f857493d4c0e89f3b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ea18fc4c7797bef9238b4dcea4064f99

      SHA1

      4881eeac89c9a73e1f5a8ab8460bce46d0961421

      SHA256

      00a4a13aa6483ba039b91f90ddd0450109421fbfad1b82b95f4bb8ba21478810

      SHA512

      2334327bc74b88e36a1039ba67158bb981de166454ea5e9a17f2e648b8076ad036af2e36f3fa13a9dca4602090591d1afb73680c322f0c23e4813a0eb15ef88e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bada34b3be5f2e0923f8da45c2a35116

      SHA1

      e7c85229fba30e662d62161d68137dd63f94a467

      SHA256

      19c336f4ec60f24f31e7ecaeb647e59dac53e2c8b6aa69b57942dd633917eb18

      SHA512

      92ca2a411d0cb1da3eaedb487c953bc9fcd5fb23d50a866ec8c26c4e36b22e07318ac7f6f0d8901957f130110a7b94fe3acb239c8683679051bcca31d3469c84

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4e4f31b40b1369077e9279f5103bb780

      SHA1

      7beb9a3e06499f8680e53334c57b326bc1c4fbf3

      SHA256

      4198b2fd732cb8c520510c758de3de476e743cf91ae8085323720b2a7f935d3e

      SHA512

      7d23cb3b9c22e3c30c1749ddebef7be70e008da656b21d9332081bbb054081151f6526d4dbec959c1449df2e5c87323e44e45c7ea07142912995f32e1895e3b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c3b8f152ef5cd94ed7bd029cc1e07054

      SHA1

      e6a67086a4057ac23d29d78d20d0dc5b49d07b6a

      SHA256

      80bbe90d6b4cf9c1359f80c5abdb607358b0d24880e13aff7eca4256ae7ce16a

      SHA512

      418900722f61e20e285c5402a1928b64066d389ebb3f4e7e1df8c1489b5cc3784d09724983e335b90de4c803fb0c51e186f8653f55d53c4b1988a794864f1fda

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d4988a09894644e61d80a1a5e66ee7cf

      SHA1

      da77b780531f96080d8457a1114c42518c7d2cee

      SHA256

      fbb51b36ebeb192d451773510500856681e5cc13acd0194e7d98cc104818ad1b

      SHA512

      8400d0fb5abc2929941fc848f555d63e13a28d98b077b11983c036b36ba2eab6a528658c05d5ae33c6bec8cf346a36da34492d6db17540f2df915bb2acb6aee9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      719968fafc55609fbb7edb1b6e11cfcd

      SHA1

      c1e88a79076d7f0b7f95f12e484c7b9e6f5ab798

      SHA256

      df1957a2ecd7335fd7368fac18affd52c9b1b91fe24f0fb426fc1e39641780ed

      SHA512

      7e393d6c0c70539e9caf65aa54b9ce0eb4a6aa8403eb0ef992547db3981f782a92d414d3f7628fe16bbaaf091e57dfa5930636b7bda954680c586616ab637c1b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      db45a4d5c422eb597a33df73e24418ab

      SHA1

      3cac511734ae327b3078d5ceeea170027f0e64a7

      SHA256

      63eb0e055485809b2347afec6ea13a24262c36ae3eef5ecea26837c6a5a32571

      SHA512

      258df4ab924c37930dd64bdfc190edfb3d134a2b698843b4928129b60ff50a70f58284ccd7a4a7c60ab5e81f077aef0d91ed936b1d2049994c8681572772b973

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fc655103c81f14fb83f65dd0f5057525

      SHA1

      ed144b542050a3b71de273557940e1516ac5a562

      SHA256

      2e661c0e11c9acaba32d20b8476a9b8b7cccc3808cd38428217dc4e6ce2d83c5

      SHA512

      ed0d92f9b200f40182fc33c7edd790f70dfac2e3f8f2ed410af5df26f2374b052e4c6d205ec871897691ba774eec11b40c2d156eddef171aabefb4ee23073ad6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      76981470276b1336ad7b0b926d51f6bd

      SHA1

      f509243820d6a85754a414a01080a16537a6f4b5

      SHA256

      42d5479bf5c51d5f8cb4b2c0e355d262816e16f173b541b69698c6abf96f287f

      SHA512

      580d0738633a99e0cc4ce511d020243bdb5e11762b3d81469e1612a62bdbd5d93f2ab5817b2429f95928cdff0d1bae2368571fffac4c0fd913971a39133834d5

    • C:\Users\Admin\AppData\Local\Temp\Cab1113.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar11F4.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1536-493-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1536-492-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/1536-490-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2232-482-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2232-489-0x0000000000240000-0x000000000026E000-memory.dmp
      Filesize

      184KB

    • memory/2232-483-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB