Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 00:27

General

  • Target

    6cc78b43a778335c0fcf2c90ca35bd9f_JaffaCakes118.html

  • Size

    177KB

  • MD5

    6cc78b43a778335c0fcf2c90ca35bd9f

  • SHA1

    374658fb1ca2aa56852a8b91538d2ad60eaceaf0

  • SHA256

    d8f7c2ed84d1ed0ce259fd977cdf950265b20403a2c3a2cc8021f85c399c86d2

  • SHA512

    189c8254fe386935e1eca7e52e83442dbc3156676faf68d5b281399eb4bc582b0d3d7523eeba1621a98501a44c2fdfed09fab6e167229f31a5b33bdf6f56d789

  • SSDEEP

    3072:SOxMyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SWsMYod+X3oI+Yn86/U9jFiM

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6cc78b43a778335c0fcf2c90ca35bd9f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2108
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2832
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:209932 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3111fabd8aa7b039a4d60c8512523f54

      SHA1

      2a40b93ad3a299177b59f665cc796f283255ed36

      SHA256

      a610ce7810de8d8afdc649bd62df74e0b6db1d856211e9b49848a021b5378d31

      SHA512

      42df9501f0e97dba077028bfb64fcf59449cce32ee0188065d94461a5dc225ca5f1f4461844f1967cc5bf966653e30d30de691da303675a2bb35f465df5d1379

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      743b877a12103d8bc06d8e73bc3bc0bc

      SHA1

      5f692124232fdf5ece3903d8632241bcff91bbfa

      SHA256

      70c2db9974bccafccc9368bbe699cbb15bf16e9e844b27024b19f6bd885870b1

      SHA512

      8d409c3c2baa9da7ee9b250d41fa691597521c39d31605c5487b11f848e198622f18e22bff28bacfe441deda1eba3afdd4abe220ca3b7a8b711f91a6bdaccfa3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b5682e54d44e928ff859834dda2a88b6

      SHA1

      d3f1b303aecfa9de331d538ddfc8910e5592a109

      SHA256

      186bab77ebb78c28a906c4832e7e59833bcbe729f826b8b508dd6013f4e7098a

      SHA512

      1258d732cbc4cb7d7729308559b8a8715f2bade30d425b538ea4365f6b4ba183b4bb0daaa18c437277b907f4a93e31e2aed772a708b457d430514c9a48dc0ee7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      840efd47b04e2198f4cd9b29cabd45cd

      SHA1

      12aa2b6407bc135a7c3a7a90fca14030e6122ac4

      SHA256

      dd6d78be0b9d5aac573c119896792375de56f73f807cfe250e5a52a309edd2a0

      SHA512

      7f0922989fbe543829311e70872f4f4705d09f4d1c7584cbbb2c201a76319ea102fed28249fedc29afe7d44a288e46cc94019eda14b2d0a6cb47ba97090541ca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a6857819170facf3fd84810898fc6079

      SHA1

      dcf2fbfc982ec5241de51f8746687e02e7e3ce91

      SHA256

      cdf116a3dcd6a44fea5bea0ed90b3ce857dd3ce8186c1506af6c3babcd9d4724

      SHA512

      97a210c38a1947745ea1a9c9502d7dde75342c78dc201adc5496e965f27c3588e40d757aa3213615198e359bd863ebcd3fef47f67ae60f05ef0f59244a3bdc7f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6aec4183aa81a4b068c92379f1636a0b

      SHA1

      7fc161206eb5ddc2d132e7fa997559d2ca96be47

      SHA256

      9efad40bdf378275e71c3b63e81b0df0498b0edde065478f56faf3e5055f9e76

      SHA512

      f582c60cf928ff3223e0536edd4ff2ea00bb66986602df42e188d9a8b9a0041d939843a0ab7ce862f02a5c53866e1f85af171c871d3b222741bf1a8c316f78c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      806f3c3325032feb45aa5d7d5d7b4fc4

      SHA1

      c30d2a2812db59fc14ace851dd79baa6e29d16b0

      SHA256

      f43c058d0fc57f24451c2ab463212ca19b976ba526f23f8d03cb88aee5dfbcc8

      SHA512

      d763c5cc20cad1af0190cb589e9f52634f46642646a3ba8a800a0d49ed68a419dbf7201e7457da94bbe1dc521aa547e85e656ca81890b30dedfdaf2c1237c10d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c72ac0a217a1e4de690687034237c6d1

      SHA1

      6da9157afdf9e9ec8831ef789d6cb9c9ec02ecab

      SHA256

      1be7511c54ddf3df426c222b6c1bf855f7088196c4e398e089e54a11adc62c5a

      SHA512

      c16986be885917d925a52c306457f7fcaa6349b8af4afd6b1e0a1e611dbd15e6c812c50e7548b78fafc81942ce349ce7be9ae3b6dbe3e228e7c47d9c7db7b4f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b8f077f6d77325ba2b4ba41a6004b8a7

      SHA1

      d86e1cff09aea5a969269087ef64f4a065b47f34

      SHA256

      2bac33453621fc8de260d1134b239a9c03e2d6833a683040a6d6ab56eb040bea

      SHA512

      a9e41970837b5beb69025bf9fee470db7ad1e215073025130365143c5b5fa533319210706fbad6949bf68719780d37e8dd0ade3b4e87171d81389d2ac115af2d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f2770062ebb00f8ca5ccfeec4410f308

      SHA1

      7516dcd4908b461e3dab9b06965fc1c92eae6e6f

      SHA256

      89229515bf4b0bc79cb40d0549cfcf7add84a5aa5c9ead0c0f8f34b8d8aca59a

      SHA512

      2db6964cde386826c07a8dcb7ba9490530638b77874aac9c32f4f255333ddc40f7edf1557b03d879842b9108faa525dba7169ddae9b75e5008bf19d98ebff72b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f84d1e7635dc43950ddb44fa46e09faf

      SHA1

      bb052c512aebdec056100987d993fcf77ae00514

      SHA256

      5f5d0614c90faf410cfeda0011ef388973ea700723d4ae4fcb033a21f3eb9c99

      SHA512

      de8b5b4ea5f7857f4f5c40a027dba8993a5f027d63afb7899e9f13151b3a8359a7d9e7ee8cb0a49034f9e2b7e8c6dba9f742b6cab2e6f972ed332169e451d609

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4398c0dc5b5c13768eee78397a9879e4

      SHA1

      c98e7d361dae4d405146371445983af2ba1dac2a

      SHA256

      6c05785d0040ce0dbfb5a88e8d50cd697f2a06a30f9e5cfc479b031289a0fa3a

      SHA512

      d597937d040eabefcfa6b80472a11445aab39acc2860eb2beec1a37caf943792ee7ef07783ffe75ae2bbec3e7022689492c4e383d6fcb3acd2a6d77fecbe9cdf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e372114ad421bd3884407d9f791b7ee7

      SHA1

      e4d227a36b3bb2564db25041302514a08a54f3f4

      SHA256

      4e91f68970f0e827ccfb8571131c862e754325ffe89e57a1fb3b4b343d49ace6

      SHA512

      cb9722e1b72259f4f3e285593f115d5880796b6df326f4e9e0b1b28a52e442483047e671b6a3fb597db4e6222cc6a7550d0961ad88805aa82df2405ffae9f64e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cbd6a40517edf8ef6492fee3d1c4e12a

      SHA1

      8edf64a68d14da360a90202310fa274ca1b40d58

      SHA256

      d44dab0382aca0f004793eebd00431a84ea99f13b2e01250070a3abd53371d1c

      SHA512

      e4c9fd1bcd26737c59be33298ec60d1fc543c84715c2d8d2171a9181ed855593514621b9a973862b36948d2354e053a517c01357987c5674b4469abb259ede1f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      67a6559b38ca633edfd7e1e2b825145b

      SHA1

      f8d0c3880c97163005311bf384cc196ca998494a

      SHA256

      a8e16d338fd1c6b51250a24e44a7b7f570a5409b8e46f0261023610a063a5367

      SHA512

      994f21180c038cd0aaea3009b353506732575a30b5d8aca5c3ce66b5c5dec02a4dac38dbdab641d28a6c957a481f8c77bbef41f115c1c281d1d5a154f9f2ce50

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      70ff623291b22f69da778cda1a566b00

      SHA1

      eb7e7ecc224da05d4494eed989b9373ada80a6ab

      SHA256

      f002a1613284b07d0212fe33c1eb3383c0d4f0188e32d3102201bae47422ccbe

      SHA512

      95ae7671d33db2f87f799c1b5ee4fd8d4db822df162815914d420fe580dc8f65891c8c8158507cbe9635dcc27aaf2552f4aaa4db7702caabceca1ec928151374

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      811b8e0219415dc998fa8a0e82d127e6

      SHA1

      6b1a15ccafb5e3466927a85793302df10290da1c

      SHA256

      e98313e01ad26d8cad66d46c11dae6fbe1c1b0f3a1659c2cd2e2585bf3870694

      SHA512

      3329b59614001d52d77e37c86de16702eef750548bebc9eeff03331811b6aec44b3bd0ebd89d7038a0900cbc758c13afa0e5cc8ffedd51acd2f99ddb595af823

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d4d04229bad0705468d4275b71542056

      SHA1

      81aaa1eabb5e3b7ef5bbe19400e465ae09a804a3

      SHA256

      01770930e35e8bc3c929c412c7b90e1f4ff72b62e07f8448a3ad0997db53cffe

      SHA512

      e057842164436811bc3b5416492d3ba22c0af8e2b0323701d41d8961a26ea66fb03f6774460c3160db1c70660cf8a7fedde7bd256a03e7970492f9825ee6f63e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      47f204364eb59245bd5cc35efee26658

      SHA1

      3fbf949c9dafdd27b8fbdbd3a6f7dc423a59db17

      SHA256

      cf799041cba8e873214a1be19b0bc54b1050aeb952e59db94b5a0e080c40b18b

      SHA512

      8e24347ded9751e7ab7abc19b5023d878009d5fa58030762a1e2982b3a727a31d73a0ec168b407a099b25d24e760da8b235570919124c0081de3937f65856381

    • C:\Users\Admin\AppData\Local\Temp\Cab3C19.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar3CFB.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      83KB

      MD5

      c5c99988728c550282ae76270b649ea1

      SHA1

      113e8ff0910f393a41d5e63d43ec3653984c63d6

      SHA256

      d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

      SHA512

      66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

    • memory/2108-7-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2108-8-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2560-15-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2560-19-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2560-18-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2560-17-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2560-20-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB