Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 04:07

General

  • Target

    6d4a0565d9beebaae8fad61bfc37e30e_JaffaCakes118.html

  • Size

    205KB

  • MD5

    6d4a0565d9beebaae8fad61bfc37e30e

  • SHA1

    9bceb0870244bf883902f7f2b36f04292b735d28

  • SHA256

    b9dfda5b1192a8ff12b8a89400509f0048db296b3b1ef894e520e8e209990271

  • SHA512

    2cc205ed6a615901dc20f4a8776bd5bb389d8cee1f87531ced1eef6d17958ff91dd3c57b40f4113038c2613e3c42e848b1cbe662609874399d82bc7beaa01f04

  • SSDEEP

    3072:Sf/zwHVozKyfkMY+BES09JXAnyrZalI+YQ:S301obsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d4a0565d9beebaae8fad61bfc37e30e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2544
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2632
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:209930 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2552

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3c421a1a22464ecc77456680bef481cf

      SHA1

      8961cec4712ec69bb7ba87e7ea0ab49911304757

      SHA256

      e6140fe2475ea3bf8145333283884da3f3d41d9de5310ddd0af2e87091e5bb2d

      SHA512

      cda7b46c26728ea2293c4f3a203d317e0c187f7e9d330cd7046ab587f641b0b707522212ebbc8cd2b70010630c7c956a898f516f707def82a456027948ebdd3c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      157ebab4df073d16519b1ef889ff50c7

      SHA1

      5143d5b1b6dce13905f095c7e4d2cb3722400181

      SHA256

      a38122c89c3df373eeaa88805c656bfb9eab59f716b95101a6da99cd0a2536ee

      SHA512

      1b4e1920cf0dccfacf318cc1798e8d3f74cdf1d2ae09c09135609467c68f05ddc8d318aca1c6416b0b0ac498abca8f70d707b8283a49523c3a56f0774340a1cb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      beff871d550026e09a789840d98a38cb

      SHA1

      fff74ccee74b7d99e50ab1ab84eff3261db5c7a0

      SHA256

      3a80656cc2dbe860debf5e6aa932870e8ef3e25ed74f3fb9795b089495b2ec63

      SHA512

      540f9b111ffe6e60bcd92704dc4dbce7821f8df6640e01521bb737bbd41211d94beaa68b6b37a98a393baef7148efd9a39efe472f8a7fc8250d12e1ed2878648

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fb3d5d19f59af722dfff81acf9eab8a9

      SHA1

      c04122d72b34b890cad09a2aba7c76677fa8d830

      SHA256

      bf5a10a0fe8168614bd14723810bf9f4278b38086d782213acd5c6e8bfc900cb

      SHA512

      00e605601bdef058bd2b761ae630ecdbe53c98ec873d92086ac0081ff56daf12f52612f561fd0ecca722762a5ac17a0b9fec00c319816bb2900f3d05c062a6c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9c6497713d6916d92cb6b64e5883e9a4

      SHA1

      4f694fcd3937ecf524987f30b1fcc4e105628234

      SHA256

      6f2a8261639e99c1272e4ffb98cf6a5ad9e93e95e6e0a90f2ab8724c28d192e1

      SHA512

      1ddd07f1d53cb4693ea8189f8b9b6ad55da445d1830d51cdff3e1dd0e43da324d3321510d100b59eac9e351aa2211d7448b466c7cbd9f5744b0c7e9993109cf4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      88eb4aa9e6a50577c4eb7c89347e436b

      SHA1

      93ea2058450dc107c588e889c3ebce8b54f0ab37

      SHA256

      db7175ac29887fcbf094927a078e0ee080030195514dd30ef068ff998330e24c

      SHA512

      f0deefb115433a0005ef90d8ef4c0797bdf6b0279d804f61035ca23ae904aef945057f2d0e8f56de29cd2337e1d1c5bcf1a23c7d64c8b8a5fdd983bf4d8d59b0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      26ba8fc55f219253f42db9af73c63350

      SHA1

      3a4a55225105827feb15803a1fe254db40d2d94b

      SHA256

      04593fd67035b299d94b4f3a58a816552383f5162f371f7c2c3cbe84118d1429

      SHA512

      84a6796c050637671b5a50dbfd9f46a53e7d37419c668b91d067a78a963b1cd7deac3e403f65911f5618d244444fb6c870ba1045a621c26ef9d2be7b4d6a0ef9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d9733b1e04c96679895c9568fb5c296c

      SHA1

      fc6a9cdb5586a46b4c3fb12419db6fa007e1c35e

      SHA256

      3a62738f15691b3e260f14d1217829213373af3a1420b0c337f7494abbff0e20

      SHA512

      8cbc0a702b5f34349ee85c39676ac4ad53ab1483d0f716f97f9323302ff8b25616ef9ff4aedf14e82d33ec821d6272f39044e55449ea1254201f1f6b8f2390a8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      994ec15448cce1e88077ddb948ce8d3c

      SHA1

      889db85e63a4184435e865ada3abcafe14ac18b1

      SHA256

      6364c5cbccdd04ec1bd6a80bada786afd1c89ff67bef2d0467c48bdb79e3b679

      SHA512

      0fe7ed24e8e335ca0358167d5ec133191a46bb9fe37208ffb7901f037fb08c7c7f52eac1d5f6e17cc30e421955475ea77cc0a41c5477f3137694fd26b6445d1f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6a719fa6790fc8cf2b573a2638c4b8d9

      SHA1

      e0925bdd6d24de641d67708114cdaf0f870f8ac6

      SHA256

      575087a7209d49eb4fae374bb9c69bbdb37fd30d44f3eef9126318d597190fa3

      SHA512

      9f257bf44ad2a25139e3453d6c076e32e507287b1d93494ea71aabdebc0c597f217062a5346d01ecaefe03d38bf4382c430e4b28dc9d0f6d485470be344cf0ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      98d1ef202691c1e66b544a928c422930

      SHA1

      bc15221b0d636c4764f5f3a60851be47bcf293c7

      SHA256

      7515bf3ac3f354e41b36bfb403440968bb507daec62b6bc24141d52d016bc65d

      SHA512

      713804b731513b60abc701d28df8a48e9b6bb85cd6efc478207a54f8c7e1bf794f0700ae7bfa9f71b30f8cc4785f6524349c1859adea371460f836cd18cb5e44

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a2f46325c08acca64c64b869825211fe

      SHA1

      b5c12276284e8e71247a399beddbfdded0dc3877

      SHA256

      4c702ee2a78f0651d42200619ab14e1ad9c26d4ac52d3199c14fde0e0acc024c

      SHA512

      c3f0e563479d4c89468833765c4209bfa07489f3436915f99e91ceff3bd71a18df6ff40d83b79c11298d0105831cc8444489c1de9bf98e37e8554972ce8f6532

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bfdb5cf16a2084b69367ad95e914a20a

      SHA1

      15eb54746e350d19ff4c69b9f91b1c8bce164d9e

      SHA256

      b5ae1ab4c8b0a143103bbbff0ed86b1ebd31686b7f6952807db96604d1ba6342

      SHA512

      ca8ecddb491cc216f9322575ffc1bfbdcf0f85fbcb4ed833e6032dceb629e77358ce5d9db1432f4c6c432589a7a19ac0224e0fb83252d334694d22a5e4ff400e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      dfc903d67f3e4863c2e3afcafcac3fd8

      SHA1

      9c6584d307f8bea21ece878a07695973eeeca356

      SHA256

      127e5a70d9f9c7d5b367eefb96104d9cbb2c8bd1999b9276514b7496e2d8b039

      SHA512

      f4cf309db8ab5dd6be434d3f91787f78aaaad4a575661b894cdb202a9eabd7828332f10bb181ed73c5b50c87ef920d13fdd5046c2ea992e3e448d27336605d6e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      06c10a19277a48e48679684fe8b4be53

      SHA1

      cdf9554da7f050db5bc58365e5bc68a4960cd162

      SHA256

      2525f6c58996e7b2713b999f3c7b40ae124264449912cf1846a4cf31bdff9886

      SHA512

      36403982586ef3a2d640859c5f3bfb27a42dc275524da461e9c4cd7ed88534452cae0b26bfce12db6231debd618c34dd0fd0cfd230c3f2566559752c022393e6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bd997196dc0f9f938a79747110601ca7

      SHA1

      95178f3825bc2f669c1f0f0aa606fd905efb2b28

      SHA256

      01844a1157586c7c0d34bcb1513dfc4aa635aea2cf846ceaba50932ef5e4d9f9

      SHA512

      fc6fbf77fe9c501722962a471ec570f351819b2cc6d2d3dbeb8998df2a5d7a89860707891237f5a872041dadd01c67574db92b40edbc73d363064e93b66d1782

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      67c6fab5ec51ed584db5235d5370160a

      SHA1

      6276a85b9d88838a5c9cf849f4b7ce79b3c2db2a

      SHA256

      4741f7db2721e0b4c5b871d23dcd9e8c967ef5968d87769d8790498cfcf1730a

      SHA512

      46275931b9d7b1139ac5cdc1b941eddd5a2aff8ffefd6d08a2ebac6c0177e5af8273f07a3df501205500b39ec023456ac6a620cc91bc4d8c92aaf6898bed0f70

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5db93014b01d1500cbeb71bdca185915

      SHA1

      5d6f896fa469467c298343bf1fca350738b36083

      SHA256

      e6c87dfeffb1953dddce50a1f38aa165b262225afb5e193004f9d44105f699c7

      SHA512

      2f40ba077ff012d79e2630560add3517a25c37a51aaebf187625bce3b10a5e982040b81ce2043d566af609cef2406c78edb035b5d35549eed60cb1b59da75dbf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9f290a0bf2d1310c483b43a653454cdb

      SHA1

      8a7e2ac5334e55c38578c99417060f7f172d2965

      SHA256

      b132661618f259dce4609657c09e445175bc444e7ad44fce7a88f1c5a329d410

      SHA512

      569db3ed0a407194ccfaf266d8903a3579babac0d76bbb7cfd05f1017bb87e6df6f673a4bf68e3c849ea97c50b0ab0ea4fabf6e9e052ada4dcbd7897755aa585

    • C:\Users\Admin\AppData\Local\Temp\Cab3EE7.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar3F48.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2544-17-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2544-15-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2544-21-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2544-19-0x00000000003E0000-0x00000000003E1000-memory.dmp
      Filesize

      4KB

    • memory/2544-18-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2816-9-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2816-8-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB