Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 21:29

General

  • Target

    6fd9b51656e9b958838270d38e78c7a8_JaffaCakes118.html

  • Size

    115KB

  • MD5

    6fd9b51656e9b958838270d38e78c7a8

  • SHA1

    1cf9ea2059db7a9230c3ced2696ed5e651c6500d

  • SHA256

    4726cac539cb1d4b26fb9b5a888a3832accb02bd2033856e8fc01a98adaa9859

  • SHA512

    deeb7902a3bd1f56204596f4195bfa0349af8f8330cda4a9ff87593cf8beb14f590a570c8d9f84172cacba85caf5d0dd62de12dab4f93ae062323530ffddfcec

  • SSDEEP

    1536:SxVyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:S7yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6fd9b51656e9b958838270d38e78c7a8_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2872
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2880
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:209935 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2736

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      252B

      MD5

      e6840491637fa894c5c516ec46f54c1c

      SHA1

      9a243c31ed99c36975d4a3480ad752259a025048

      SHA256

      89b10b914178fa88e9d1a935513a5763fdc52555c03ae6b23654eb66a4485ca9

      SHA512

      079acdc17d64d2d38dbc0703d25a1ad565c460f5a9ac7903c2c1d100482eab95af6fb37fa2f0a8a47b8c307fe1b6c1737528a888f2e43794d808f1925424a07e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7efde6593ce74ce96400799e01d09ed5

      SHA1

      5315496264b836527a9b6e8c30cd894749a477f4

      SHA256

      a3aaa33f1d6beb6b5cf7d07682bb56774586af78c338573582a57ffc8a89b460

      SHA512

      855313be7c602822eed367d9ef86835d2989c6a8cf6d3e99a8b8dad6d18c5f491c51534b4c2ad5d99bd9ff34307490530be2c15c7102008a10ca32ea5594f1af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      81953835c93be05f4fcaa6332a53ddf0

      SHA1

      14e6088dec1a16a0a9920cf06c902641093e63fa

      SHA256

      9e968cff07fa624eaa579bc165a0d23a35afff70b564d09cfcab0f2716caec4a

      SHA512

      eb26a4b78adcd55c4c02bae0aea41cb16da0f742dc36b0d07d8e35fc278bd27b312490e44b42c037028a4a203278b5ca50d62cd82658fe6deefad45356e0377a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      802091a40ddd4e74826220a9e7a5e451

      SHA1

      bf790504886ac0e8a46951526116572aceeb17c8

      SHA256

      f27669d6ae901498ebb53c05e9ddbbf5cd47b4f84dbe2ad3b6220ebb8f8230c7

      SHA512

      500f7b353229526b71d536aa243729a88fc2c44b4ee5649208c9dc953e3565aa05c93bc350b42682421c7a423b30fc494fd4ebf21c03994fb183a07a597700a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      92f2d814372a54d7b515bcb0708110f7

      SHA1

      74fedd7a71b564efbda4021b67d24afb229ef65e

      SHA256

      cc2cd583b47195c2406aaa47401ebb45070478c23214352da25176a7c5c20d26

      SHA512

      13bab57353165e41a40501f112b180c60338f6fc2c390ae4309f859f5976e7528e07af3d34e9b02d8c77d817bb1715661f92855f21b68ea9dce8231d8eb7d5a7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8c26a57c59d2663e0995dfe7cc68ce9f

      SHA1

      bb3d2c87447c3f3b33c287812c952f524c6a16d9

      SHA256

      31a716c368adcc17ced91f1622cfd88a7ae46d87807ab339b0c8d87e702e4702

      SHA512

      ee2889613fef363aad0d12e31bf0bcdb2b68433e871d03e063bb0c052b62741f35f8ad359c96e741c2d60369385bc50a540cb9bc0c3cadb16c1289c78d959192

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8e424ec3ef133e74e4ee7384e45bfa76

      SHA1

      49c0287f78eb71976a185840e2ef8ab82f8755c8

      SHA256

      fffe3cc381281a481411d209a226c0b51702d9bfa91e16187aaa85934a6c0369

      SHA512

      033a5cd12b980f7557d2894b3d74533d59024a6d9cd2e641e86c555f3437b22a1ac5962ce8620c93277cb144ca52fd59a7967313d3c79792a70c056fb9941ee3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      dc5a9ac33ff76097354886164c15a42c

      SHA1

      ebee7f972af2e0294bcc701c7dd822bf92a9f4bd

      SHA256

      ff49a5ab921eb8f88784d9f8f06d8d7387141abaa9500afed6a5b227d623605c

      SHA512

      d7643fb6e7280536e37946dd8bf89aafcfa052be39c4f20f9d1edc98bad50e87c518a976cb864f93a7c240b835d80e7ba235e9788807485364b11a8a842432b2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b9f592ca2485d12ee10da23a5d12f715

      SHA1

      8c7c4193361d58add6bb00f56ff27fa7840809bc

      SHA256

      02d570009f7c05d51b2a58fc26a29c23e8c1d0d017e108a2e16dde249fc4d29b

      SHA512

      ef1be78b026ff95b184a888b90ae5fc0b1f5235c69c1f438c9a26bcd7141d33f67e07e64fbe2c30532e0d3be800ac8c6f2420d6be35d4418697344ccfcdb83e7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8016a977688d8c2e08b533824639c7f8

      SHA1

      436c4b676ea28f113f9de969cdd06ede097178e0

      SHA256

      6b1cbd5f2db3b6bb810260e5ff8ac89c3e1ced59ad703d163e528244a7e44af5

      SHA512

      27d6aade2b81a7f920552b127d5a79ae14be9d0f329e5520c6d1613cc8cd3765693e352e3c7bb2e3ef877c2881acd2f73328ab10e19e414df751bad4f3528593

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4a6a2f94ececb9052f200f80572944c2

      SHA1

      c9b8007a43d416d1db96576d1980b318dfa0477f

      SHA256

      2f7c5c845d6d94808d2b5cf6dafba2ae5ec613f76ab599892381b2f18cff4d11

      SHA512

      4bb51a4796377750783e38d91ef36ad7efdb704129902a9a4e9415716fd59c3441dacd79e82bfd41891f2dc55b72a4fb3a381591dc35f02e5da8c073784312a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9f6200a9a48d8b8a0cfcf060b0db548b

      SHA1

      d45f62c4447f90739c21ab7651c702e45531af19

      SHA256

      10634c140c40495e8fc8d2635a3d41c4ee6a71b046ef4a4f417e6b07abe863ec

      SHA512

      fc05681d15deda4a2bce22065531d47be01483887386a21df5b2fef15441028fd2dab749b5880d3ba3a0b3b5c240f36f072c6a80c5a1c2ac674494b2da49ae8e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5985a760763f515d4d4c5cd8e0f20eba

      SHA1

      5c57326a624cd070ac3ca253f76135e7c2dafb5a

      SHA256

      1e13a0ca1ffb5894ec1c801e152c965a05da1ef8e232ddaaf05ffc30e52f5b22

      SHA512

      532481f49a99365f6e1a595affbd22439f5f2b01a6433477a66f91e0b7b6094f279aa85819bc08de2338ba8857cbe499c81ee4fb209570e9ebfe98a2001f2c3c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8a9a67ffd2336ed4dfe1b2146e30065a

      SHA1

      c9c2c3b8f8c4d92a1ae554be745ade55692231e8

      SHA256

      a7fd5f4584fa370769b9b16dac8967d5e2a320f73604aba40f50bced710cb020

      SHA512

      ac84885175da29af6cd348e01d319760b7ca942fee152329dc2b54d11898cdd5965aefb296932e868d4c6583bc6c1b3e3944f275a40628c3002216ab8d9f1080

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c2ce1a5016380355792e95fb9b60572c

      SHA1

      bda7fdb7214ec3cd572cf0a53c71f9fd37a83abf

      SHA256

      9dbfa65529b70fbd7e9a93f41ed6956b4d04175debcd23287d6a1f39f0ff4593

      SHA512

      b589c48f97016f200664efcfa48b3876759706715e11f39dfb02b8634a1f02d19b7e11ba8bd74b91b1be3af49b4c92ea1e02efe71ac68a3f1c6414c67effe524

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      761a914d6c29e1d28379927b94f56849

      SHA1

      234a26835921004b3b89ba16832da64b34f1e17d

      SHA256

      c9f40b426cc117f95b46eabbb06d400be6bc2723bf2c710bd39d4c65b9dd1117

      SHA512

      aaa09343884e67456012f9dd9324883974530fd0ccec9e304d1be2adbab013344a0442eebc3b83986741aa3b75263dad6054bebafe591817008f3ae58d3c72ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8f63d547fe54cb86b4dc2c879be44d7c

      SHA1

      812e01b8c5bbc64a32a84671bd41b5f5bdcef4d9

      SHA256

      cbe6b25c155d4eee8cf292efa26ce45318fe2e29dd2e9c3f86beab966fb74059

      SHA512

      a20be5d1530fdab557c17236fcfcda92c527914322b2e0ca04159da4e56146782c641596478f26b1974632207c7fc9d745698df0c6b2b1da5373773be020bf70

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bcf0e8443777335b07d902f293b1f099

      SHA1

      56883aa643dffa5647240e8c4d86b927fe3097a3

      SHA256

      d4cbdb3317aff3177b3796998cb4539abbc70ac93d9315928c70b1f19567d115

      SHA512

      035f83e7b11078f5beb3703e9820ab193007c67416671fef307f8b9c27e4cfdaea3f589885d3d78e6b2eea2206fde88c31b5a21cd0192ae6af7624f440a7b876

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0c7b5a626b8b4f9b1d894145b22530e2

      SHA1

      75af102b56d6bcf7f8930b04fc2a3546201b0c53

      SHA256

      27b58388fab0937d083eab625f8fd91801b414c2a99f15a9b986e54d2514ae67

      SHA512

      6d18f8897a6b6138dc86a763d7849d1068dc6bff4516f4ca8e5e7c8969f6840cf8c1bd42334c2ad90b1c2deaa91b1ca9376d2595f76b13967b537502b20f9d63

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bdbbaf67c71adbc2b079094e6608ef6f

      SHA1

      23f2676df7a0be4a3a3f490715c2a26a26daa179

      SHA256

      67c16cbe333f56ea97ec2d31c1991cbaf7b6dadc00192f05c34066e54c9c2123

      SHA512

      1050519e6595268d3309fb2e3b216208ad73eed3e973fbc8a3543319de0253bd19c758df92b514b005356fca46ed1c30e755d2761d584051427ad7fbcd22d22b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      c61658f0c39a6ce74eb2114d8bd1ec26

      SHA1

      9beadf5f69fa2510fba00b1ebf103cbcdf3d79fb

      SHA256

      8532de3ca6a7f2c244e3ecd6f383a879ce03b6c8e561452fca2a8686836cedc2

      SHA512

      f525564f4322946e0eb9939f965504dd6c62212ec09cd381ce45de6736822a84d58f74a721604bd29fe805997c751fa7808fba9755da297c013499588e2aa42f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53B9JGIH\favicon[1].ico
      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Temp\CabC36F.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\TarC50A.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2452-10-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2452-8-0x0000000000240000-0x000000000024F000-memory.dmp
      Filesize

      60KB

    • memory/2452-7-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2872-16-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2872-18-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2872-19-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2872-21-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB