Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 23:39

General

  • Target

    702b6ba9f93eaff3ceda7715ed0e68d5_JaffaCakes118.html

  • Size

    119KB

  • MD5

    702b6ba9f93eaff3ceda7715ed0e68d5

  • SHA1

    aa42ddc3e0140c7f6007605e930ff98a53fd0b82

  • SHA256

    92d28358b4fe69393d2420ff59aae67e8516f971a71bb97f3e3c33ba846d2c13

  • SHA512

    3b8fe4d72073b59e33d4ef6dcf983590a38724d90fc336383a944c91ee03ad6ef929f42b144b0aee03accef426b278fb8b6b47e521784851d5c955d748368ad3

  • SSDEEP

    1536:SLZpvoyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:SdWyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\702b6ba9f93eaff3ceda7715ed0e68d5_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2552
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2564
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:209933 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2392

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e842806b5f3f9abbdc1946fb319ae9ad

      SHA1

      63e0821d9019e90c0a83b98311b1e97a8ae6d5db

      SHA256

      38b91799182661a009f41f652dc8ba532334e7fc8295d49e23938b4ad5925470

      SHA512

      9fc613c9bf9e3094cd319e391e260f60928d2e3ae11a8d7d203f78b9f21fe202ab72f0e4fffeb83377e07e4bf6d20e75adb081c734d6360f177d129f55d547ed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3913b3942750e68ac5be83fdd4f35bec

      SHA1

      fe311e30a1929d6121388f164552c0e5f391bb10

      SHA256

      d87c680e9d155ec04b3784e747f0d7aed061f0ec03620ae464c4840f85c54c8f

      SHA512

      0ed871976569d63be9dc497c95cc101523b9143c8dd42de756bb6022010b3a0cf4f563668d1b337f306ebd361d544f39bca1577d9e0f9c4c00106073c0867101

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      643ba9b9ebc0106c108b02da0bec90ae

      SHA1

      3da78a6fe32f5af6b0e1cd5232a1559ec525d583

      SHA256

      547f3bbcf8e2614e56bff763c33a46e11a8fc86ceb3f37536ffa73f833cd450b

      SHA512

      a412a8d1f14ef689e77c9310839e5404305a491276de3f13de73ba20db5ff1a1792245427d157771162e5325ce1f1968b1038bc806b273eb8f57c2c7a20f7ae0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f538162278cee3fc57d57fa0cbff2da0

      SHA1

      bb277da5c30f1bbd1cea343551bfe6dfb7a04d71

      SHA256

      eaa2db8950538c7af5cc4c27b6c4d81b358a8a8965f2bf52841d2b6c5f5ae3a6

      SHA512

      e03aac60f2e2914805673596098feabdba36d4d0797f50f4d07ff99312d6999d8c0fa147cfe2412b5a4bc9cc02edd2fa815b2e7436061fe3d4a232e9873ddceb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      20070f8c30e4cfa883d56c2e5edb50f6

      SHA1

      7650f7a3c5bac8951e276a43faa1bee583f4cdc2

      SHA256

      b0cc368de90130f6d463ea3f114285122a7b1cf2f41407a44b1a11e464935102

      SHA512

      47c06b86108111fbb0f95dd6750ea000c5683cc8697b9bb9b3bbbc38e592c2840974fb4143e20487bf5cc5849d6aa364d4e97163e4fe99b8a8ac1ec28b532908

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8ea277cefc431a337b61e231dc348d45

      SHA1

      09de65aed124b46c99bcb7ae30c93eab139daa1d

      SHA256

      532acf790e1b2de17bed083911c7aef04208ded6c72b1b074169ee8e59b1cbef

      SHA512

      8d3ace7e2b22d578e295270df7ba26d369c898c3a3ca4b65888d9124bfe813597bab3690d9a09e132bb4e268e0a362b111b15f49b42bec9ca87665239a565001

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7dba10434bda20ae555e79e7e2e7cd87

      SHA1

      39d5d00dc92756fdc4551841dbbf099a0d92a114

      SHA256

      e3c699fae9c9bc7b77e9610e30ec8fbc561c4da3d070ce864a16bc583ada9e73

      SHA512

      81b6de7cdf1145bebe793b7e40aa6314b7f54ad6db1509dad1b33372aa19ab0a241210bfc50430cb8e6bb741411d8110abd90185dd33b40e956212aa97ef7bb6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7dab407f3580f148c4f446bf639eccfc

      SHA1

      13735494df89ab0795fc6d180b926fb08045a70f

      SHA256

      0737213dcafc063280fcd203f738b902435660445348ea67d35c28ff85e4bd4e

      SHA512

      a6a32a670be86614c93d3a1585d8f95a284686e506960c0786c3f3cc5f89b62522c0db9ee3982261a8737456788931835acddd3786342458047ed3ef1b1b50e2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5bf142a6c2113d55e235aa2bbfc9da1a

      SHA1

      7e40a9e7a8a17acd608a8058034f53263cac0eca

      SHA256

      974e30b85a7e90bda3b5153e266ec3806177d623feea199c98846e4d85666db2

      SHA512

      16ec3dc9a26fa0ee069c621c8f751df8cb7c293b1bc8ad1eda77ebcadf28527224b79085318df7a6139d6fd63b266e15631d6ef5ac346d71e45f1262b59af74f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d96263e41541e5b9fbfcd6dcc5757953

      SHA1

      b87b196d368e9d9b82f584581d5b4454652390ff

      SHA256

      316165b1af3b67d79e31d6e2dda1b32dcd7fe68fb85c803a32c61646fd06acbd

      SHA512

      0b3b6076ee4f754c74060513f6a974e300bc5304f6422fe2e9314c7117a270952ccd24778d96bcbb4bd2d64fcb53942c1db01209d67498c114683ccc50a4042f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      563b9ba5ed5b2dda7e4929da5b6fa509

      SHA1

      031e5802e066a18e36372f9a8fee8f867bea4b32

      SHA256

      f43e499548ac840c35c85dcf0f94140a72f9ddf5894471387981b9237aef71ae

      SHA512

      0c5dc77803321e75fef06b8a3d751f99991e76a03ea6c532e76a5fa47c35849f8d26316567a51fbc2341e09b21746042d3414b798127681c775f2112b919b2ac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a4236973469606ea4022e29c794439ab

      SHA1

      cfde12413f8d325741c5e1edfed3c1f3cc06908f

      SHA256

      25aba0df901150aea1f6a41e40fa455ca9aa7e56a7acc1ef1b7b532bd6e462f3

      SHA512

      04ecf7c5a677298e2618588294ac06278bf131c38d07796e1370c5847b6fa84b0b68a9d938b66dd015b95edf2604cf32105839e1c35084708b10fa4b15fa80ba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      54453d08da493fc507791b4b86de1cd9

      SHA1

      48ab08de5deceb40fedb5f3708139c81dc0561c7

      SHA256

      12f7270a1c172197cccfe68d1ed0cab97873476be328ab8d7e28c1832f355c40

      SHA512

      bdaf7dcd044ef5c587efccd31ed54c36789fa37ab5ea70af6b894afcd3a27daaa5e8a3a37c2aa3bb99eb3dcf0a289c3ec4c6e9614dcb2a058db4e60d72cc2cad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      eec3c0398b29b64bb93a23f3bf3f26b2

      SHA1

      c85bd3a8076137bf4d597e496c1658697f304178

      SHA256

      ba74178997c0a74cbf282cfb54024372ffe99005e7368a1ba880133234a9bf41

      SHA512

      382602730cae33f5786a65e9c74d1f27742952a1d52516f96825952c00ccf32724194747f92dc365e9ebc26f0a50af7a0e52ce15b614213c4df83425ee9b550f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      16fde5611fee7f435bf9e68268c8dd25

      SHA1

      5bf84918b8e60d95fd3f9099bdc54bf365eb6888

      SHA256

      4283cf113c0f5ef2102f435dc8aa86e7b55cd32dff7655bf8972ded1cd78ac84

      SHA512

      f67f4c5870556aed998f3719e958c4a28fe26e84e293139227aa61bb95e0665732d64fdda0f94e480cd14196763cf2dcb4496dd88bbf4cd2b38594b417176df4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      646affbb51e19a85cf085095c069e341

      SHA1

      d6810b27e08bb6f33719f7d3c52511cc032ea8a2

      SHA256

      069fe87ce25e031538e0dcecd565711c2414098086bf651a94adb4cb200944ad

      SHA512

      e080e6c8cbf1a9d01a0a1e66b28e6a87c75e701484b66c768617b2772142df6300ce7533e406d10844e388b4220b81d310912555f6e058ee50ef1adfa46da79d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      06489ab624efe0fc522db8b87079cf2f

      SHA1

      dfda1c9d263edff48fecc716b8c7f3e29420a3ae

      SHA256

      cb0f39330599e4af46a971d826497cc2f2933aefd307e5d61a9773fc79f11841

      SHA512

      150bdc2f916181cd73c32d9be4178b42e397ef8b3f1907ff4532184ec135123717d0dc0d4d1d2248bd054dbaa2b09630d1886ae7fca44b69e741727cfda994c2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      341890bdd17ae0bfa5f4dfbad5772673

      SHA1

      3ce9b2c9e76ce41d7c3603e4f0a9faece3b7f27c

      SHA256

      f6635b12872a97516ccb95b4f3f1164016469f5222eb89af9fb59e3b1a2ad3c9

      SHA512

      b78874aa09e7199ecb46b46592752ff88ead8e0675139388f2d2a13802d5996c3ec169646f4793b66475ee847afd33ee7ad935a982cfeb24b186d0144545a4f2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4099c5a7900623ab98e3f9fe119f8fad

      SHA1

      05f6cff0d58705b31a75cdcefd6d19c901986052

      SHA256

      1c55406ca4852eef78119b2fecb406451aec5f46ec0ac3b17b28e6b02b9595f7

      SHA512

      7e97148e910b515424e125a5f92aee5e2221636273b2ba30b01927857f282321a058e3582b941a2fd459d3052f945afed069d9dda40259561957c678c8111855

    • C:\Users\Admin\AppData\Local\Temp\Cab345B.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar353E.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2552-20-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2552-16-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2552-18-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2616-8-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2616-7-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2616-12-0x0000000000240000-0x000000000026E000-memory.dmp
      Filesize

      184KB