Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 18:36

General

  • Target

    6be309114073efdfaa4584e208312cb5_JaffaCakes118.html

  • Size

    129KB

  • MD5

    6be309114073efdfaa4584e208312cb5

  • SHA1

    3457d5eab4f0d8aa2327a424d14b235b1d218e7e

  • SHA256

    6089796f866772004b8cc090f07e2debc25ff2d3b627ea3708a43e4781317e32

  • SHA512

    1a4c4bbeb9ff36ab4b0e5c4e00a04a80149b5139b07a81b60ba599c05579e2c60ef9aa335608e4c0dc3b1fd8827141f55b0af4c8c02de224a7aa524ff6a26d9e

  • SSDEEP

    1536:STvbWcM1DgtqyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:ShMegyfkMY+BES09JXAnyrZalI+YU

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6be309114073efdfaa4584e208312cb5_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2952
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1932
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:209940 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1712

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7e234cf701aa164617edabb1a2c642ca

      SHA1

      8abc7b6fc5574676e44eb9633d91fea7c67a5ae3

      SHA256

      19bc04f0f51956f14d4d6f80cf04072f6fa134802b17605d98679cf521f9d24e

      SHA512

      68bf0e1f4d5a1edb077c2ae990390377fc85ea108f59e9959c5a0f492120e123827bf44f74037ebc7ca16c41f5dab150cf563bf3ff218a79b0a7cc3de0569068

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d4001d73d602a6918ab0cbfcde780b8b

      SHA1

      6a0c6fe7a7928c71d3197299c2da2c62f705ca53

      SHA256

      8b4988ec8103f1ee520b35bb930ee7fc5d5d812176792e77cd3d5416f95f15c5

      SHA512

      2f7a41cd9ef12604e5e5fe9f4fbe8626620569c3a9308aede253e7ccbbe5aec3f2d801cf4f0effadd20234bd9b935baf23e8f3eb7d2da231b33f096f9123c531

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b46c58c467a4e370e53b6b4f448dc0aa

      SHA1

      57a298fcc266a9d16661cdee247cb20b97d0334e

      SHA256

      5d786a733055ea142babf195bdca2f5ff3754879b8146dbd04ffbc42d115a015

      SHA512

      f90b9d705f1db6ad7f5afd0561185cd58b783f5eb037ccf39092243c76b73d13b0c19459ba5d01145536131081ce7ba0b40ad2e16915d32ce813bc4b1ab107a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8faa411afef2934ff78dd78c51883b38

      SHA1

      d65f638a170d1950a1e750a1f03a52b426323389

      SHA256

      3421f6a11925eae11d5ca761c8b1aa765739f3b623612262c40e04d095700fb8

      SHA512

      a0bed1794c01a232fe44c49f20372aa5e2250d1041421ff89660f6ce07389d45fddd5b489ef6c4d7bcdf9807d4c98d910a2a698ebd917b73086b2da6ee28a808

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      381bb6ba60fdfad2889d51145f343ced

      SHA1

      7d5ccf2d616489e69aa9fbe145c436291dffce7f

      SHA256

      06883988a06665a14c8b75bd96d1d0d8ac6bb35547ea53591dc8e9b535a15db0

      SHA512

      3aaf851d427ae653c1d254adf0c957d574a1d773f32701bc20c850fbbc380d5260d5b103b9eed244feec641822d8e32dfc2fe597fb7917306a7104dbb7a55c7d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4871ea62f42bcd90312bf96107bfb4ee

      SHA1

      13856fded07c76883d58d949268e7e48ceaaff61

      SHA256

      7b86a240bc7b78ee0a5275bc3ff7c1de66631e2220d33b890b445c46a517d9db

      SHA512

      3adc8c1128c0f9669c0a73f9f004767b10bfb870cee8a9776fc55cdd15c10d3668bba81dabf45eed7faf92657329b028340f8e46f7fb0a3207b66f6a079ab0a3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d3006e2440c056aae449a6ec10673974

      SHA1

      17ececcf4a14faf65152ec5e82f4df83deb9b9f4

      SHA256

      c3e75ae06039f82f9c9ab0e46576fdbb611975251fd2ee6be441c0177474e7e8

      SHA512

      1cb946ba8dbbebbda4d39c9ecb22f2c20364ea3b6028c1bb7fc712ec895da6718abdf1e173355b1ce9e3fb36e85ada77ed4747d18cb8ad53ab30e6728d92fd60

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e740e06f15b3c3006b1e130cf32986dc

      SHA1

      23b1e068caef79190e43ea6a2f153cc3f960c426

      SHA256

      6e40fad58f4c4555221e4fd71448d50df5f31ce9dcf435df7e0e38a34f09b63e

      SHA512

      a63e14ef7a0cf05ae3da6108edcf827b473205ccfca7e2c272cdebdf3ac346adebab5c289d3a4add6cd933a058fc2bf9b8cb2177ef5209045083f6be204b9b4d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      64558a6902c808fad1a6457e91588a36

      SHA1

      3659475a9de0e51e6ab4639af85764b25b4eaab4

      SHA256

      eccb5e293a0135f927d0c61a33e5ff3a7adb606ff55b1b7dca3007f193dadd7d

      SHA512

      f490b3cad8ccafec45ce8efa227f36f4dcfb0199f94933750d3153a8a7cd7bb8b2972a6a8cd68c1fe175f35d426f89eb01bb86ca393d6b4dd555bf3c0d76e903

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      78199dc87d765c4d288fd4ee063f831c

      SHA1

      aea4d95c64024811760bc41e3ccd5b79c98bcaf0

      SHA256

      c7ec6db543b88cb76b9be44301c3c63d7758c8aab84526445df0ff02809b0881

      SHA512

      c99df663c107c81c1f9b00051099890b7f0be03c56d0938f9514fcad4765732e6fecda6d85cebb1110c35127d703cda701d3ec3cae675a9869fd5604edcf09bf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ba324bd322062297aad74a649ab4bb82

      SHA1

      9eb3c63209c4592f50392df94772e8798224f28f

      SHA256

      15a4186617f5bfd2fcf7e1f2ca3dd46ccd78a7592f53f3efe21c921bd1822cad

      SHA512

      18de591870961ae411e00e4f5ad71ef6fb2437996bc9cd5f29a9ea7736edc22ad97556c31d3ad941722b84da7285770cfc233a3d0c01e736f91cc03a474826c7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2c9cd91247312c68581f70a36e4156cb

      SHA1

      6c3471d3c65a40cc2187f6c5bd7a6fe2b3ea3b5b

      SHA256

      0e46e46e4f9c4ef28b38c42b36613540a53c93888d8dc343ea1886f172a00d89

      SHA512

      55fc5af26c5abc022bce3845508a8710d8d825fe351d9469d2a985e32e7d6d071252d56eeba668ffaeba664a857bade084282384754cbd4801c5bcfba0c60fd2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7934c32607decb057ed2cfeb4318aaac

      SHA1

      7b1724605e9fb88fb16061c30ea5d2017b67f420

      SHA256

      f30d261701a914cdb3d13bd4b7fe6a15bc1af1eccb3aaa06591df8975ea3aecf

      SHA512

      e779559657326a2aaf6cabbd66c38032182f81db361c6f561f24e2e68e85fe08e917407386d1682198b7a9a8cea29d95648e4468ee0d9faa035b440eac4dfafc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fd42127d6d32e519b5bd728822dbe104

      SHA1

      41ce55e8bbc365c93a21a50e7f215b8365e0cfab

      SHA256

      9d22a42afd3029451ad1bde71fd1b417195e8ddfba203e15e4029e8e503af156

      SHA512

      ae9839b89dc2a9ef7928a64a0b771ee6cf2262b512f1392ab817e3fb51f3d2808f35e448ef5e4471db62b5f485a2ded8f699b2c987fc7096bd59d3c22fd8a62f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      22f5b8da54d297ce156356532eee6ecf

      SHA1

      dc429629a55435360f1023c75ce2a08af5ce13f3

      SHA256

      0b5841222e417805459be33618526c9767f6cb4f34dc91e551670dfac89da3ab

      SHA512

      dd810ba2c137a91799d8e07189c64dda0dba9ea48b487b0aca85c2010408469e1ac4bdc2d317dac2545d9e84bad4483cd85af2ef94dcd3483807111c0ca822d6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bc271d4d146fc974892910de4f78d00d

      SHA1

      f58dfc9ab2d824b85c052536112321a3f99d53a5

      SHA256

      6a0a0364a1afbd6ac20d9ff770fcb6ead8867ab653e5433885b77c368a4b6535

      SHA512

      25e5643f4386d5de426d9c5ad5832268e4982e650c5ee046fb74dc9e504e0bf6728c5cd51be6f5d672f39fc5e76129c0102febea54f7a6621363412c1237bd58

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      719e6a9f3409f9065b978c8ef4b48266

      SHA1

      8802efe2a624b7a663f2aa6403d907f9ecd53423

      SHA256

      0ff0b81d177f139bbbfb185dbfeda296dbb27c4f64825bc9ee6c8c64f3cece1b

      SHA512

      f24116f8b167b13b28cab6ee4ed9a647739484ab32210319d15f735844aa8be67ddbdfb4acfd5a0ddf9b4fcd464904e41df6d3cbeaa6470347eff4d35e93fec1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      172efb98fd898c0457b6e138eed69eb7

      SHA1

      2a9ccba8383405613816aa024ed4ae72e71a6b99

      SHA256

      4cfbe7a7d0ea4298c652244cca973227b21a0adfe42874d955673a8de56956db

      SHA512

      655c3511eb3f785eb05552013581c3a45b6e136fc6d23783b7039e63afd786674b18dcfefdcf4ebdea9956bd51c3ef362a08ba5ad5c108bd8ac34f7d5ca4a32c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fc0f52abba9ac8567ff2d68530519952

      SHA1

      7d1165396c38cc64d0a0458b17de127ad9b68efc

      SHA256

      97cfd583418372501ca981da3c645d2c9803e0f86f4b43be5f2263175491e7b7

      SHA512

      10b0cedf5d90cfea180cc418a6cc4b3cb7c9ef9244d4d2dc3b77976b38bc916872443b8ee631333c1b5f0f9e24c7f96c4006cba094be5e6f294b4c9a581d0f02

    • C:\Users\Admin\AppData\Local\Temp\CabECF1.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\CabEDCD.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\TarEDE2.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2900-8-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2900-9-0x00000000003C0000-0x00000000003CF000-memory.dmp
      Filesize

      60KB

    • memory/2952-17-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2952-16-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2952-18-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB