Analysis

  • max time kernel
    128s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 02:17

General

  • Target

    6d0ab6e4ab0d77ba02ee705a3fbc73b0_JaffaCakes118.html

  • Size

    154KB

  • MD5

    6d0ab6e4ab0d77ba02ee705a3fbc73b0

  • SHA1

    b981e9eddc507c41a47f2d91edb0f96475baa01a

  • SHA256

    a9cdad81df7c082bd6cb6ecb7cda4fd7c24a765da57055eaa9cdaf8b56482fee

  • SHA512

    76c68527b096e5bb127754f53190e3613234cfe493f3db4be9ea109cf386538914ef5f43ddc640477745af4cf4710145e2e8b675f358842e377854a3829ac44d

  • SSDEEP

    1536:iBRTdo0zu+NP+XrbuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:iXjxcbuyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d0ab6e4ab0d77ba02ee705a3fbc73b0_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:976
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1700
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1632
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275469 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      272c69d32a7a92259d57d83a2414ea29

      SHA1

      e69b5f52113c2cc3eac529d79cd0ae54242bf8fe

      SHA256

      9285d0eb2caf4caaa19884b64f01a35c94b7851d7fecb2d16616a8ebbe84bf55

      SHA512

      bbf4b9f8ab170abe78f41ac3eb1c521ea8350da27e085fdc2cffefa762e7d6a82380549e7ca5c8f0b05c3e88e4fa71e0782da56f24667529dd5e18271cb76158

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      121dc8d6486bbcdc3f90dff935087585

      SHA1

      42ab20ef73e9315439700226995c2fda05d2bbb1

      SHA256

      ad2ee9cfd8f3100b56ebd7cd639090e4245c799bae943972090d63dfec645872

      SHA512

      58c7a1fff1dac8b62e9ec3b2dc80106bfbbc783ec5fbe4182055f3339b219bf039d6e6ee127cf223487421cd75a1f2586fab1abf84aac30d66998bf9c203b1ce

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f3755b30d476a235203de63d100050f6

      SHA1

      7895ef4d4a2b6b69f737136ba69484ccfa3d28f8

      SHA256

      2e58d932c5f8a33d18b8a378c037ca8f4f68a10948b6e6912bb76b24e5e91b35

      SHA512

      3c210efc6498ab7ca39bb4e6c9b866c25b199a9e938f31c2e0f75809733ca4613e1ceff7cc389fc1c8bbec237dcc2d5e0e7584741210c82c3e7f56df614d682d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      356142100b6266f773e1a92f0e07e43f

      SHA1

      4f606a292a5f9f2d8a473467c162dbba313a5c45

      SHA256

      2ba95c51953b72bec2d2b5ead0ff6785f12ee1405663a009f5627ab7a15c28a1

      SHA512

      f9db97c232c665c4a4490483a9b94f8cdbe099d1744014c504ecfa351690ce1a4fe5a4a07cbab5c04900c281e76fe43bd72f689f8bce80e758bac9d19801f79f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f5f6dc0856c5b3fbb7e20dae17347dd8

      SHA1

      bf46d1c0226076de758897cfb2e583e4e0226f07

      SHA256

      f86d7980bf2ac43e9bc5a50b29132250de00e4606572a11f4ae85ca689ba54bf

      SHA512

      3581153661fc8de95b853a607f2e5408deddf573ddbfd178b26c3519d58042d2c08f42736ff591a90b3343994ae5a53ededd863365bdda220d54940f5a85b4e1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5177ff08e2f9ce7ff0c4f88004b8bfea

      SHA1

      707cd19e34436fe6dcf1dbfcea0b452760e56e29

      SHA256

      80f6917678a2b05f1df9b1247eb4204b1fc7b95d6098bdb49c01df1efea16326

      SHA512

      c5514b41b38e53af48745a552a001b82ee0ba3cf0fafcc0adeb7da70fa9e792901aa27641212caa1bdcef3a9ae708f083e20cf2d926748e97c1dcf2738efec8a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      00d38c234db36cb29b609d179e10f148

      SHA1

      d8488aa736ee483904372adc1e97762efe5d75ec

      SHA256

      6ad77cebd9039f6a60f9078ea798013086353ecca37a64100b539d72671149c1

      SHA512

      c6ac55f8b85ef2911bd98159b21e02151fad3c03d09920c0a3e403d6904c77bc5d502084584797d689f686ee725a0dd647f5a184c497cc6b620968a2042d7cbf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      81b300a87f8d0d860299c20c8ff1f9c8

      SHA1

      5412bfd58857878f7984822d6e0c0718ade6f60f

      SHA256

      87e62443f1717377567ac7ba78b99e25cb0b228c91c1b7545a38b787b8ff50de

      SHA512

      704338942efe087ccff7758722a4096bec3c4a15974b1f4b83384595058327a2e6a04feaa87b808af7e6a4a43d1c0b8009b3363d6428891b9da086c18846583b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      29cbe3afbce5203f0dfe3d9e9f5aaf1d

      SHA1

      772bef192d9623e7bc69ed65e2f6c6b455ae669f

      SHA256

      aeb2859dd3c0e8fc7faf6a441a998bb508fcbd9ea8d4ee7a5575a968ef7a69a5

      SHA512

      512037988da97fb494f80797af531e52f6c1dee044816a0606cbb3998720d29388f7a6c4e4c6f89435ece93188c5799ee3eff054b74eedc335846631e6f783a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      dce848562923f0f7a65f613d9afd27e2

      SHA1

      b8ae094e5bce2ba52f76618cd0f32b06403c4dfa

      SHA256

      16b52a5aa63aa0097eedbe2378fa7b0d1f715ae247759df5c13ce75099c1e7b5

      SHA512

      8d532ec1647170e8994c9dad5ecfff3baaad263ed8baa20b48738f5c8557279d932bc4ae05832a8d64d6b455a45fcf1c518c80db6538adf90af16ecb79097349

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3a694923c02b47e01f941cfefbba2a18

      SHA1

      f2bf08bdd94db437c174528fe825a0176b2d174a

      SHA256

      c9292addbabb715258c57fea38e55f413304adf5f72eca15fb71300cc349705c

      SHA512

      ddb0ac4b087ca76160485146a9c547e6985b8b4e3f208b9a1cf6892a6b2683db35c392ba8da131ee80d86d40eb0f3d5ff0629cc84e4f423cad07e1e7e71a538a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d93e91b8b41b81aa1315af19829ac6aa

      SHA1

      e58a8a852054e08b99f8f806222f90af10c9c8d5

      SHA256

      2a5246c74e5aa65f70132196734481b01292bd62a1b2ba0515909be367ad08a7

      SHA512

      0b6737c3a9113e316d43c31cb1bb28a8b2cba49d3497fffe1e19a5bee3b3edf52e48cd23459692af35435531a18d60282dc4c6be269b9d981b95d5e0f7c586f1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e79ec5533dc5a041bb348678f6c9b6c7

      SHA1

      19dda0851bae1b3bd40d20c31f3a89dfc93df46d

      SHA256

      a446abad159aec8a71e7bd23ddc23656878cea01e25ed8f1d9b56964402e2738

      SHA512

      d079e76d8dbae31d092d02fb50938e921dddbd2b21b5495fb21c39c7f01e75e7b51f09712c65080ce74fe11666ac3c61f8c115d0332766670071a26d27708e43

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2e03896177a66928c79fb63dfab53b24

      SHA1

      fb2d72806e9333a525d2ae16342eb9888b4ea7c1

      SHA256

      960fb8fbde9dca156a726b22dd580189225f47b5287462b7c07e44e48f89af93

      SHA512

      4357ba6789cb722bd157e1aa208c04c5b80b34a3816fbf561bdaacf129f14129ed431349fa59c965d391b897251b68400500f59b2c6dc2bfb0980f9b61b49f7c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      46d01945891e96c65f16ad9e01eadbef

      SHA1

      d34bf718696e327b83d10b0a81a5cec3e6c1ad9a

      SHA256

      7592532f0a3b0b173a0b1e1bef8508ec2c9ca4f51c1d19ca0d1e271b8911ab53

      SHA512

      397279200a0967d1e9eee6766a9d5b35adc9ee725652c62438a3fe00767aa8f8220cd9a4252f555e4d68477d73dcbaa39f0a488d176880b06a43d6cba736d50f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d93d585c703008c6297fc66dc76baae3

      SHA1

      9030a9e44208a87a834d9e34de109037b0513f57

      SHA256

      f86fa0452471bf6f6fc46a75b63c02960455dc063347fafaa0bbc68045825b8e

      SHA512

      3fd806e34073372a7c254d4db8ac571dce18adee8052fa8d16f2b2e06c77302a011357a0379452c5063fb2eb0af168b56b7e4e22b64ad97256e4423b3e7de483

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e3d89c7890ce70c5a9ab1b524aed2769

      SHA1

      413d63309798a3e4a87a45befbdc17aafc92c4fa

      SHA256

      ff1cc3cbf49fbec076dee65af5b7bdd2df1da8d7f0b30d2bba2129ecec2d6cbe

      SHA512

      b37c5d03bbffea5a7293cca926ec9283cdf4ff0b32134b5425703001d93047816bf0a972fe17c63e77bbf92e9c0d175a1a54db802e3ca7dcd32ed67ad1a68ee8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3e7748702b45babed3cda4c575bbef46

      SHA1

      eeea109949b7c99a955cadafd641154f84b7b8d3

      SHA256

      488f38e36e5bdd830638af0c77b6925f87ea2dac43109b0fb5298d6a85c314d2

      SHA512

      e9ddf4e18b63083a456727f0869def1839aa1a32868ed2b71a180e21d8c5898b188006dd759fb35e6ebbca40e0af491861fee6ab5f618903f6dc582dd369df49

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      89629c111914c264c48ea353f93a5582

      SHA1

      7ff70415dba27a53909f7bf57fb5751ae4918032

      SHA256

      3f14d1a578ad70be05ba50dea0d295e59f31b9a1c7f09f39e2086fed36566e9c

      SHA512

      8938a966820324cc26f7fda799feb2c94983b1007cc7a5e78b981919e1e2bc9eb013d1047847aeb547dc290b53fe4ea066b7fc6c2ff7c62560b3cf0825bfeaf2

    • C:\Users\Admin\AppData\Local\Temp\Cab21A6.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar2288.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/976-484-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/976-483-0x00000000002B0000-0x00000000002BF000-memory.dmp
      Filesize

      60KB

    • memory/976-480-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1700-493-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/1700-495-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1700-491-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1700-490-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB