Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 22:26

General

  • Target

    6ffd47e7c3c4db29b8ef6bb8318655da_JaffaCakes118.html

  • Size

    157KB

  • MD5

    6ffd47e7c3c4db29b8ef6bb8318655da

  • SHA1

    dc36a113f6de66d77922527582b2e1c9652c65f5

  • SHA256

    8bb57239e23ad8e5d99a2860a7e4754576fe245dbce70e06a37e955e8b06efeb

  • SHA512

    d0794a392ffafae9c96ea1ca16696f65fa5661fa9edba25ed92775c41b9cf5742f513de58d0728ce226a34361f600705c54c3958e354cce632009ea071eaeea8

  • SSDEEP

    3072:iI7Ge54OGyfkMY+BES09JXAnyrZalI+YQ:i2GjODsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ffd47e7c3c4db29b8ef6bb8318655da_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1172
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1688
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:406544 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        PID:2820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5f44a9f129dca3f896d75cbacf67e8f4

      SHA1

      4a7e00332aa7b9fec0101937c9504c7be0ac0ebd

      SHA256

      da74f2570b77a14ede574c9330343ffba0267d2a76a78417f1c8e09b241be619

      SHA512

      6a45bfad9d27bc5208497c1e3a69b14ce0a1de8361c304a571a70962981a712e078d981320bf113b87d9509be571471cf3be14eceb9bae5efd9dc203fccba28f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      897a64cd049f400113c8bfb484a9984e

      SHA1

      5b89c437f10089e251bbde61c326511535f1b725

      SHA256

      aa868b153d37fc6e433f1c2dcda6cb391a778f11e5f8b9415996b8b80a286ca5

      SHA512

      a6e29ac4f627ec8ac99c4d0625a57ce8001e69d0d591ebb109cde8f70e4555da2ef82e32e65f0d61583f2c2cd366cdc29af053f48897e8c33bc35a45d2e53539

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ccd9bc2c71c89f4bc00b4ca634909131

      SHA1

      73a4533d9cba62478619635eeee723b977b81aa3

      SHA256

      5480c41f52e5343603687be5862a6146271ab0815064cae4f2b05f334047448a

      SHA512

      ac0ce9490f748d895be35d1d6b2df62286d8455f17d1ec5201dcab68dd2738d7429211b17d16a2df8e580706f3fbd257d84341d085e1fa9d37403cdf9fd8e8b2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      19a2b210d0d999fec64548ef85939ebe

      SHA1

      6b58a22d73fbfded1ecc9ee8cdfdb59406cef8d6

      SHA256

      1acaca5f9037a0e186c2d325b2fbfba91e9adea8388e5257749ecefcbfd7e92f

      SHA512

      bd747866434e91f963b0930b5b0c2e9b109a0902460dd1b68b7089f02751c4a5499a554036a609eef140c527ca0d5ba7f3d57013ad8bba413255c9779fdd915b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c065d105a0f6bbce7f454bce1fcbdba5

      SHA1

      55fe5ed8fefe7e7133678e6035812c4f3e39ceb3

      SHA256

      e82c90c66e7287db85214125fb1481d5bdb645aaf162b0c2591e4a6127fac538

      SHA512

      478b8eda139d468dc8eab62ee2b925bcda1edb09c9ed23677779c2a47f09d488e61f7110edf303321b4e785fc6b5d42b026acb0228b42ad1dc15f635178b1ea3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2a753614ab2914a2b840b775d4dbd46e

      SHA1

      009efb97fce38bcda7657f4fc132117f4c5e31b8

      SHA256

      78fb9f63e1b2a647e195e0568af7d45c45305b44a75b33fd032a116fbbfcc853

      SHA512

      4769ac678e94e4e03da3da5236e9037288a0603b2b64aeca95308ed06c83b7b65612c3f1ea6054899099e22c03b8e4976a1c3e2b89d76701af40b4defbb772ff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      174e11c173b7ee785c08b13fd3df1bb4

      SHA1

      f23a3d5c574a0e44ec423da612c0b262777ce1a0

      SHA256

      ed237d39fdfe2a965ff799a08a9d2813ba4ee309cc0f09423351b68204824ae5

      SHA512

      aecb5ad80f632b93bd93291adba285ee96cdfbd7561abbeb1e0af465db68914fb508f1791a386e6c0c138683f8f9503d8b8be7cb73fe03179fc3d280b476cd34

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      79844511edd89882355be37dbe3cafe5

      SHA1

      02c15fbbbb7858914cdb8bb161beb86bbe70b456

      SHA256

      7cbe5739d87fb5be5d1d4009841cd7e4652f4618b4880611ba339c9ad31a9b30

      SHA512

      363a3b7a335f597f6e1e24051881b09492ec6995b70f707820d5b8d6e78c435ecb769acc982f410f71783c1bc1144c0abc4b9f223818efeed01a448e3128f72f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3680696ff6a43ace03b9084d362fe118

      SHA1

      22ac727880226d8ed1c6535561fce89762b6c702

      SHA256

      3a1876a5e966377f3d3bf271e48f5e0c135f4bc02585888d208fc819309ee85d

      SHA512

      3c9824a368d9d82e134ec2edb4648f8a92ccc9c2dc283dab51c1f48d21c1eaf970b6dec2fd2ecee854e2fd160dcd6c23835867c1605da47c3f76d1b042408c9a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      618ea29e8f2c83e10a264bda47fc97d0

      SHA1

      73064f1d0c43be096af41abcffca0102e404a493

      SHA256

      88f9b92233005e34d2918469fd1b13b31ed73266c45db30315ec64dca3352b8e

      SHA512

      600c2bcd72d6305a2c02f99bb9b048eed32704dfa1a185749327f6b9f400ff900aae7819120dbc30e84f3231fceb944619299baac27754b7ffdc83d22c09cdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8c723c2a5eccd45f7e4f5333172601d2

      SHA1

      6c0dbdd7f0ea990d6ff44d51e8e03d86aec54068

      SHA256

      86ec6a7063c3deb02617cfef080491ac413c200c17ea0c4c4bf1210ae575c53a

      SHA512

      9666462476822ad06bbea6cf61b6679a84800eb5b667487f4ed4b30d5103672769dd775de76359c44ab33f8b3e90ea2deceb1ca9b4a9fdc30b3f5059d93d3436

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a4bf4facbf9908ce31633665cbd3fe98

      SHA1

      0ea3087b09673106ac9521b1a9cc8bb3d134b12a

      SHA256

      6c3c612064e86f180145ca7b8fffb083d722ceebff18210cc556443b6b20de12

      SHA512

      d0b2a7c9c513af73f54411c6ea47466f3482ea09f35384dd54e7f84cbf4db94b3b9c867e096d3540d2ebb2ce3ab1d07d483b394d1e9497dbf2fc34d6aa299aea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f70c8f0b168d11f8f5ddabbacfbf3b9f

      SHA1

      10c405b53399a7e11c59e7d751c2c2a4660981fa

      SHA256

      d7d19b2c2b0e580bd0d9da2c4ff52a066e564bdd9352c0d86e8da7cc58fa4466

      SHA512

      16f1923a8e8e0293c5ebef06aedafa84d0e2720a4f2701857a079dd9af0dac648fd96423d17674bfe002cb7514365738ec02ee4a03d66eb50b09aa7761758af5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      af78a1272d14ed301f4803a17d50bf94

      SHA1

      2024f045be3a07f77a57b9d32f0987b9354902e2

      SHA256

      6547292ff6a01b878c48ef8c3c756c959bdc4388249c8b5f814f169456ab9dfd

      SHA512

      4c323c5eb7139490b84e16c05cee513ebce947092895482f1a72548d43f74bfc3ea5d0bf7d0df77bdbf3f09e1bcea946ecdfc016715259975834fd4e9b5b020d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      136e4d9e1812cc12e3874908044beb21

      SHA1

      f6b551aa241bae9e2d9044796360109c7d5250b5

      SHA256

      3254fb9bee36fb7bd76c5be29aefa57e6b71ca56c5ee595d70736ae05829d069

      SHA512

      87d0bbc48eefa8f0f5a2fcdcd521b1d2f35790822ce62d8c357c62f7aaaeaef73f1f9901be06104a81a56e45ddd27ea0bec550d61a6b61407c960a315ec032d5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      aa57fd05d62c8ecb1470965321eb4f22

      SHA1

      9be8af9332428b1b2017fd65762b9210938f2c77

      SHA256

      ad13178167ec80ad2bcf829c320ff135118398c68e2bcc47b78b3d97025e13db

      SHA512

      7636bfa8e4d241cfe90b8a01fb22e866ff217e7ad043bd40713adf6cfb416a53187664e59f908617ba9d716b153ee0553c5840242994b0bf13097c962e325d64

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      53288aa653805d8d094cbcb0edd792f6

      SHA1

      1a5152c7d98e93711c441d1ea15a9c93db203192

      SHA256

      a73e5b9104cbec2f78290c3566e2003009f8018b2ef48e5ff96329016dcb3147

      SHA512

      01997ddf8b813d1790f97dbdfd5842305903451572289dcda92b7b43f9313433ec8f83bf5c4fed15068ace0697c140732a5ffada6689f08f290c1a80112108a3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      25a2d336f1fca3b9262a90a9308a2644

      SHA1

      ea374254c953142b6c96ffd57a8b50a218d47abf

      SHA256

      cf9a08224af3d3038c1803078d092421c2dd1d1d85bce1fc12ec64b280e9cc03

      SHA512

      3d69f9c75f3dfe44e7bd865d61f8f0802dfd7a1fec2ea262b64fdcd4f2538731688081f312540df1eeea4c2eea29c81d75b3e975ad4d0f4a2bcffd491c3efac8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2a4faccfb1ea5f0d3b6e8eb992753390

      SHA1

      ef93cb637aa90ccc05c563ee3d8dbb7ba18228ae

      SHA256

      1056b08205fa4100cc0937a016750fdb5adb34e60a7b420afbae32a8af8208aa

      SHA512

      e533f7d0942b77236b894c3171807536a28f1bee48a4bd5d1417117997578b6bdb7d635b5fea3f6d35640bc56830abfc7472a403d24f2b27a344989f3281fe57

    • C:\Users\Admin\AppData\Local\Temp\Cab24C2.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar25A3.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1172-494-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1172-492-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/1172-490-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2996-486-0x0000000000240000-0x000000000026E000-memory.dmp
      Filesize

      184KB

    • memory/2996-483-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2996-482-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB