Analysis

  • max time kernel
    117s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 05:18

General

  • Target

    6d7234d7c613b5a8a62ce4a190b996ca_JaffaCakes118.html

  • Size

    348KB

  • MD5

    6d7234d7c613b5a8a62ce4a190b996ca

  • SHA1

    752c884768c35c671158c2d46800b905a33e3f44

  • SHA256

    8c61c875d1bf8b22f593060298bb93a85fe879e216b5df308fade12db013cdb8

  • SHA512

    fa50cc4afe0b987f6bf5ba953c457faad3425bb7b32b8ee0d025f82082a1771dc7a1a33a94945757154c94bd7d04c6f54c2441c8a875f412b06ed204c9df9a84

  • SSDEEP

    6144:XsMYod+X3oI+YOsMYod+X3oI+Y5sMYod+X3oI+YQ:75d+X3y5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d7234d7c613b5a8a62ce4a190b996ca_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2580
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2176
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:676
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:1016
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:209933 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2408
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:6108161 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1520
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:209937 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2944

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3616d34377ecc0b35701fd4d491943ad

          SHA1

          d75c0da084441297d3cfc469f5799c3fb8bafd6f

          SHA256

          da697562a2826bb2e56cfde26c514c044ce2fc7afea68c261e5bb3cb60bdf84f

          SHA512

          88ec1e45517403ac5e0265997e7ce6322c455780351c75279b0a236d6465f13e4f74764cf870434e25944c807fc823f903fe75fdffbda4064792ef7cc98def47

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c325a7279298948363ba31e2fdf5c202

          SHA1

          0c67d2a298c2cbe4c6a1c7beb6b001c7c998cebe

          SHA256

          9b659fe77909ecd28909e3504d45629ce2ba974b0381c239b009c747cc99ee48

          SHA512

          cb09585380f593a9707573324b70e6d70951d868d0a27662f5481bcf9057de516014336e9620802488684180ce53f24f0d191e351c47ed20b6a77ba2e53496e8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          92f418b72fa7a83f487d70dd428607b7

          SHA1

          6b93a337d5e8d42c3ab46ed0b8cd4862afc67187

          SHA256

          7e32ab681ca46f30f2db1f16229f968dd5f10771d96070d17a13c42ed7fb1478

          SHA512

          aed0e3e41de2d8d3bec3337aab45edf8f66225d4aa7d8d61c58a8f3e4ac6b965b9e1f347547262a4be8734d12902670494812045ed965304c558fddadc670d95

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b8681ea158d81334d29e869c3f124f9c

          SHA1

          2d71ace788cd4cfa3ba41c3aa1ed540688e3be6d

          SHA256

          1b904131b4d30d72ce879adc79da030a5ac34b35ac18f36ce22d2c3033837425

          SHA512

          28cf76d573a8aa946450d54044967c3303af4a7797fe5729b4dbe91594a5cb9ccc431b9f2164122a89140eec5516cb385026fc55e01edbb7da2614c37f8991ad

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          9c48beaff7b7d8ef9b298d1db1674cd9

          SHA1

          1b32f6ae6c657193389ffb55e55612448b9b6365

          SHA256

          4d0f029e4a940983929f22738ec2b653cbae2e0414eb91cf49f1569b5245018e

          SHA512

          bfaa9b1907c364df9b2eeaad282cdde73eb93cac52d2db34ecb0c974b385183b6c02424881cc01bda073b0430788506673a68b395953b7528e0390b781229bdc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          df7c017c4f30676708cccc1e42b7bdb1

          SHA1

          d1ace0c75379f136aad8b5944475443419b2d184

          SHA256

          2b55944bf99bf1a48e4b586af0722515e109d9051987f867cef43c5d26fbfc22

          SHA512

          b19f1062d1e30327339d1778d1c7d4688ac4d7e5faa90bcae3639eed0d0c05715ec036ece30bc58c877b90c6394db721ec7e31e1d1bf9583fbab6b3fe6da2104

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6aad5f8178a12e4b1670ffe8d4046566

          SHA1

          8067c937a97ff2767d44860c9cae3587a2158ef9

          SHA256

          f4ca52a3df0b043d0ffc721048bd8f93f5c43a27c07d2857970fb6113e59aa95

          SHA512

          516d4429b510818b451f2adb91aab93bf8bca717f2d55f045fb6922d23606fb43c78ea2e3bc0907c20bdf7da330e99287e03dd96322401bd7c42d6e13a50e707

        • C:\Users\Admin\AppData\Local\Temp\Cab759F.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar76A0.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • memory/2176-23-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2176-26-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2176-24-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2176-22-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2528-8-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2528-9-0x0000000000230000-0x000000000023F000-memory.dmp

          Filesize

          60KB

        • memory/2592-30-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2592-29-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2652-19-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2652-17-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2652-15-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB