Analysis

  • max time kernel
    129s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 04:15

General

  • Target

    6d4e57bed7047d94f6ceff8d6b210689_JaffaCakes118.html

  • Size

    155KB

  • MD5

    6d4e57bed7047d94f6ceff8d6b210689

  • SHA1

    15dbda5e38ad85d50c4e9ea6f4ad74ec92ae5be7

  • SHA256

    223e96dad846f772c3c70593d2cd591951e01a4edcd8e5c4d595a77fc77a4072

  • SHA512

    dd1dce0c407066a282d4631ec940dd7f660578f1a364263f92c2f25f4a8ab2cbc7d24c26c5cdb1fbd4bb8a70c73f34bb32470dd9c7bb67b53289ba2b8a8233f9

  • SSDEEP

    1536:iqRT2WBSyfyYFkxyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:ioQAyrxyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d4e57bed7047d94f6ceff8d6b210689_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:844
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1052
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:209944 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      748e93ecec6523866c5f57cfac45282b

      SHA1

      617c10881f42991e2436eb7301d04101ea474d93

      SHA256

      4cf114910d57584a1499b74d054a38f591c9c7f4edbb803d9462359478e1e097

      SHA512

      7f52210cfccb0e50297519b97e49033c5a88b2634d8aeecfa5fee170b79b043c1627c52a5f54091f4a41ef81c24525c37564402b2d6c1f10eb0e8958e3c5222a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9f1b37eeff046965e13a79f52bf2d869

      SHA1

      e0e37449c0919fcbc50544d3c3dec6068d09f2bf

      SHA256

      674d3d3ebd4b752329fa48a8630275b61a127108175cc9b0c78771290a8130f2

      SHA512

      3d0942617d0c0ab0170aba4a3559d86edcb12dc73aadd085384fcedbb9ea7be346d152a7e2bda90e16ce687ec18e9ed497009c337e531a857d828bba36c32dbc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f816c514c1c011190aadcbdac11873da

      SHA1

      72c0b6c95c6775cfd9733ba8b4715efb03547c41

      SHA256

      f4d76a1f1861304e0265f65bcedf9535fceb64d34ccfad1b411d29d83bdde311

      SHA512

      97ad6504e971ca9d09168505d4fb59bfb628c33fbbc53d5609a0bbb0ae3b0d5141927e438a966d9bb400ffd35578c46e67fce3f74879778ddeb3d56116204a6a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      de8df6b0239d20c77b942a13fd223dc7

      SHA1

      bba609e0758ff594cccb63fd702837c4bb0a5d9b

      SHA256

      1a4f49e12644b01b562cc663cf653c9b10d8ba5328191fc15b8651faff5938ae

      SHA512

      dc679b1db616ce379e194a24164f7603c7f03f1e133b0865a2ba2ad2fd1cb187adae26eabfdb13d68546e63e3b4f2b74f01ef04300438f60e994b075185aecbf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      66c49103ff1643e744a12c029cb4df1d

      SHA1

      f4e60fc711f74b7fdfe90815aa61cb11005d1bbc

      SHA256

      4ad5c5122318daf1d6624800798456d6cf5d41d5aca93b87c5bdc3bac5a27632

      SHA512

      68e5efe5bdb8bb6924076df49d9237cd4a46c6e26a84750e554dc12167dc2ec3ee424d79fa89b5c24f4e272066065e30d3ccc1f9b28ef071b6088f89db4ab0f1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8e9c61e7816a50c16bb4be155b771caf

      SHA1

      b1a194e7524b677fc824b248858d169010b5d924

      SHA256

      85321de3c687304be2b13a3f143d1682c485ef3bdf190c0d109eb87cf2c6bf64

      SHA512

      8137514375f3cf693c556e0805e439f515715408c2bd4319393ff3f74800e7ed9d87379ae70710466bce5dac884bfed070353f1c8c330de70f08d24134933d53

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e2614d7da8655f9156605803629e4bae

      SHA1

      69c57a84585c27a7d42f54cdb54e129d771d3e59

      SHA256

      45368abdc111d72eaa635932d9b0fbaf8ac9d14030e0db12af899d1998b193bf

      SHA512

      e834a407123f60f916a65e2a3ae36d3a6e04f52c1125c6375703eded0fdd6633481076cda1b3a63f58909664a34ee60e199cc9e05ca63454eda7c7867c2e9c02

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ebbcda5ec14386281ecb8a3518da490f

      SHA1

      1386e63e5e797d7e895a770644b6fc889708ebdb

      SHA256

      94c3649f6f5b19e1800cbe273c8fdaa7fe71f562f1dbaf939a49253298601f92

      SHA512

      fbbf3a22dd5d2ebf0990699915b20116217e93e97cda581b3bc7c27e468a618a9edd7ae9b154a1ff2dab72d6ebf16316e1bde52e7ef88e86281d598e7926c91f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6a7ad0103dbda9dbbdfdd3f91c27206e

      SHA1

      0ab19f93992d4bfa2d80481614ff8bd185a40810

      SHA256

      39601ad7a03a1e78af97f7515c850ce9800f8443e6ac5d01de2bd35771d6f267

      SHA512

      5facff69578228becfae1bcd540e5e789d5b7065d90cf30fdc25e33d2373e000f8d0aa58bcb2f5643f4471379173d8de93d72b95ce844d701ae3ca2a50515db9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e8771b5b7d0aef91b28857149d6195b6

      SHA1

      fe54e412147a274380bf4bb3d0ce99098be9b26c

      SHA256

      bd72b80963645bd8d4f2a02df4fdb3c197436b5fc490f155c2a7b290121f5be7

      SHA512

      0ce9b1044ee4a9e566a2efdbc987c6a321f7d46a1ffce5d3058a200865a5e1fa73b7701d78b0a4f68fc4b256587953f20148c43dca95df93ff70977747c31eb1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3d1c4dd443be956060fbe0cf20eae996

      SHA1

      e14fe711016591d01891aec0234aa75c60772f87

      SHA256

      af82fb1a6ef0a51798fc5d9b0598b680e42d9070b599d6546e769fc74984be7c

      SHA512

      c40775ec85ebd284891a44d7b58e4119e533319894728a1f44b298cbc95d37918c55051ab9b89557a78c4f4813410fcbdb13a3d2c620268193ee748d6c65281b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a617da8d7a4cc5940823235fb1f19113

      SHA1

      61342ce14332cb5ca1131f11670e392db551ce99

      SHA256

      420406978bf910faf64056edfeff678fa600ea905fd0a910aa3a3b5a51ea53b8

      SHA512

      591ceacd23dae16711a5999ed585bc4102c571d2378bdd94e3ba01af1f099ec21ffe6b1f7fe619d2d00524ab15338dba2c6a9ea2cd262f4b18e140e9ccd87b38

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b100df5c4b667b0828c760c19ffd60cd

      SHA1

      6a47446bee9d3066ffdc9814c8e597364035bbca

      SHA256

      2b3803380654b8231064c969c3c9332de1b63f171eec31d782922568803a1bce

      SHA512

      14b8c016a81e4bda212373c51750443f84f264b0d501db19aa7cdfcb4c78ae4bd3aa7c04a7462be92ff04d32f0cf1cdd1fea6aa470e4337b4cec49439aa9247a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c17540b5cd376abdad3a66238bd61226

      SHA1

      07fba677f5cdadcfbaff770d0c57422d5950fc4c

      SHA256

      918d0d6977bdab0a9728fa133db00aa78fb22e36e37a67dc58cdf7267560b454

      SHA512

      9b4e636a07351d295ea9e6ddec46cd02a6dab94a9cfdd128af4f6ab9d021d6d354af75c91108a0f66cf407c122c9f722bbed7aa55ff751c9d04b28f6094de444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fa7e5a618c87845e51cf30939ebdff94

      SHA1

      aaffa71d5ff95c09da19d163837854e6c44aaac4

      SHA256

      64632eae60803960671809c36742dd458bc02ef5dc6d20af70b2922a504343a5

      SHA512

      a3f606a9d8683c2c1f24aa5f7952d026924c7efd4d25bc408ee008a392631e1f34beafcc20c6130fdc1e8d7774029495d0e884828773670f16f7a8c67820e5e1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      501a694044941353a2a800650f8faf02

      SHA1

      b94aa6c5fcad1a1ac69aafb9dd0b603c98dcbc40

      SHA256

      78f867ecc38f75372fd47e0bb0193dbab16fc67adde7c9d1833133576fc76f80

      SHA512

      3a54167f897e3b554ee91618e300a2bf0d6e14b69b0700cd56e2a53dd4746e7424b9952d3321cf4acde00b55a44f79513a4a487d1e2ac6386b7ba68c267fcce3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      33a313e7764edaf3d11ee3f606ec8c64

      SHA1

      5b0c127d54fe87e05f8cdce65e81331728df777e

      SHA256

      8e79e40e45b1329e51c6e2cebd1bf8b210c0b179e849d3700c63cc769d0a2463

      SHA512

      caabb9fd3724e0f5c38b11acaf1dd8acadcd5c3dd36e5e96218071016de49bf747e230830615ecde89c9097a0eeec3e30e950305aff85213bca1131035f542bc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      92337ce89e74352803c90f50a1ee9fa1

      SHA1

      ab53f5f6e401c61a3006ddae14caba562a8e733c

      SHA256

      8f207d8fce760f17b1435e4a907689aa4897694dc106cd045073a36f4f8f3907

      SHA512

      e9bb1ab70f35318de4f5fcb9dd504e9f584d77d6e47e831d41a8f0fe7154eb52c04c57d77d16ad5c81ddfdaf7937df6d4d486eef9de02b451eb793723fa803ec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e5348990399f79dfa2f68a7029edf22e

      SHA1

      6b261e1515224109519bdc1cc88f8bedc0e7b800

      SHA256

      a3c23f79466af700111b89ff4c03ab9a76ad0f153ca302dfbbf37cc330fde3c4

      SHA512

      d7e62204453431fa0745a63e9c075dae7b37f7ddd3b173dfbdb3afe4e61027575eb8b36a8d3b3e0bb5c2b6f576e352a8ed84e197767f3262e91b2a68aeab51b7

    • C:\Users\Admin\AppData\Local\Temp\Cab1AF2.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Cab1BAF.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar1BC4.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/560-482-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/560-483-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/844-493-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/844-491-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/844-489-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB