Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 12:31

General

  • Target

    6e88da8d75658c4ed4ed9c602a0f9eb0_JaffaCakes118.html

  • Size

    177KB

  • MD5

    6e88da8d75658c4ed4ed9c602a0f9eb0

  • SHA1

    4a46f5835e7bddf6cf269cf1c3b585c6ccb61533

  • SHA256

    587e1ac4dc86b32615d8298ef542e57e2630aefd09d6936d0bfba557763da8a7

  • SHA512

    0e4a4f4bf08b3381d03d8e110bee5d8fa7bf8960f9cb87fc22dc371b93ba42f5c4f4942961b9e1d83944f98b89f0a11dc3a1983be6a947677bbcd61245f6d20a

  • SSDEEP

    3072:Sl+q4yfkMY+BES09JXAnyrZalI+YFrGOiDXev:Sl91sMYod+X3oI+YRGDev

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:388
      • C:\Windows\system32\services.exe
        C:\Windows\system32\services.exe
        2⤵
          PID:480
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch
            3⤵
              PID:612
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                4⤵
                  PID:380
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k RPCSS
                3⤵
                  PID:696
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                  3⤵
                    PID:768
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                    3⤵
                      PID:840
                      • C:\Windows\system32\Dwm.exe
                        "C:\Windows\system32\Dwm.exe"
                        4⤵
                          PID:1064
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs
                        3⤵
                          PID:876
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService
                          3⤵
                            PID:992
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k NetworkService
                            3⤵
                              PID:296
                            • C:\Windows\System32\spoolsv.exe
                              C:\Windows\System32\spoolsv.exe
                              3⤵
                                PID:1124
                              • C:\Windows\system32\taskhost.exe
                                "taskhost.exe"
                                3⤵
                                  PID:1132
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                  3⤵
                                    PID:1184
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                    3⤵
                                      PID:2716
                                    • C:\Windows\system32\sppsvc.exe
                                      C:\Windows\system32\sppsvc.exe
                                      3⤵
                                        PID:2744
                                    • C:\Windows\system32\lsass.exe
                                      C:\Windows\system32\lsass.exe
                                      2⤵
                                        PID:496
                                      • C:\Windows\system32\lsm.exe
                                        C:\Windows\system32\lsm.exe
                                        2⤵
                                          PID:504
                                      • C:\Windows\system32\csrss.exe
                                        %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                        1⤵
                                          PID:400
                                        • C:\Windows\system32\winlogon.exe
                                          winlogon.exe
                                          1⤵
                                            PID:436
                                          • C:\Windows\Explorer.EXE
                                            C:\Windows\Explorer.EXE
                                            1⤵
                                              PID:1092
                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6e88da8d75658c4ed4ed9c602a0f9eb0_JaffaCakes118.html
                                                2⤵
                                                • Modifies Internet Explorer settings
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:2184
                                                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:2
                                                  3⤵
                                                  • Loads dropped DLL
                                                  • Modifies Internet Explorer settings
                                                  • Suspicious use of SetWindowsHookEx
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2568
                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Drops file in Program Files directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious behavior: MapViewOfSection
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2436

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              68KB

                                              MD5

                                              29f65ba8e88c063813cc50a4ea544e93

                                              SHA1

                                              05a7040d5c127e68c25d81cc51271ffb8bef3568

                                              SHA256

                                              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                              SHA512

                                              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              a3662568435b47f13ec8f0ebafa898f1

                                              SHA1

                                              dfc3128526d4bfc843ed7375fce5e6bad688f937

                                              SHA256

                                              0cdbed39105b4d32fc3c44b0f45e49c7fa293f2d9a0debe71bfd75c46561e4ac

                                              SHA512

                                              d27430c52caecd7134d1e21efff0e3c953160182f1f3a5e8d5311cf335be8292a3b0217ff4f9b37046d6d16b1751397734c46851eaa609a9dbc1867525565c0c

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              e5c0ac9cb273ea0a6c7f5fc5c6c4d654

                                              SHA1

                                              4ef88b10cac27d742615cffb4392a4e44bd99533

                                              SHA256

                                              13a2381ec2e870e828f983f31cb5f1b714a6ee43c453b3bbf7f1723a00fcd71e

                                              SHA512

                                              caa66d33eabd3bfd3aa01ec6258d3bf7075cdbd51548f180bebf277ec1da079d73353708e3bb7d18de78e31f056cb5fc20694ab40f995647f4501e4473049876

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              decffe9ee431cc3a010aa56f3cb6d818

                                              SHA1

                                              d4cc48fce13a7a2bf6bb07dc0fc3d6345f3d7755

                                              SHA256

                                              4c8346147d454b77dac17fabcd5af904092530e3a851ff9dfe5bfedcf36ef513

                                              SHA512

                                              584ca84bf9bf1e510b639ac2fe8bff536cfcef41bf9c394eb9458ac4b550d25cbcda712f67eca1729da91d92f028ca208834a799bba3e1d1f8bac223d29389f2

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              b809ef7bd910577bc6b16966736f2c09

                                              SHA1

                                              1d8b67009d5e73b73f89d5f569718a47ecf27ee4

                                              SHA256

                                              20990e558aff8aca74a9b2febad5008a3099093b26b3a025b1be718ad753352a

                                              SHA512

                                              9622826344ce6a946287f6229d98f33b13d469c2d241feb7a1b425555411e7f8ae91c557d348aca3c1d42343459949c761da94aab60c0f1ce2cd6586004d0c2c

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              7724dd1feccef8ea4e4cf2e86c9e8820

                                              SHA1

                                              e14bdca27f5ce55c3e0cb63054a3b3a7f49b1cde

                                              SHA256

                                              3f863c3c4e72eefda579d05d32919c6d8f5566b4b97b110f8de38cd01de6fb8b

                                              SHA512

                                              603c90ede8269023752f57b29faf530d2bfb475c844996dc24a0355fa746355e7b65229796bafbc3a7b72e8eb7f9436231b71246db921a7225ac46252232bcbe

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              bc85faba950e0f600c9bd9ce0e3f0a0b

                                              SHA1

                                              c57fce0600ccb2d53241cc86d1923425d44153aa

                                              SHA256

                                              134253f5dc54d600ccf9b8ac3c2b9094e1c705e97cec41f1e095e9677d8573ce

                                              SHA512

                                              2ee17129d0a9cd797e10d364fe13654f1c6b363124041ed4090b92fb51ce712cfd4940b94b924433053f2b3d20db682b46948376fa9f44222052abd6d2224bdb

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              e640ce794cb4f60007edd2c7207cdaaa

                                              SHA1

                                              064f88778b7dc0864043b690f499fba1dbd06bec

                                              SHA256

                                              9226bb7a7f505aa89f472fe2581fec8802abe6b7a95a27a801e03a3ab004091d

                                              SHA512

                                              65762ef3d000f4898be149159a4d9f3b095884e59b3342c1caf6025095952d4dc35dd30fe931910d41796a010e10b0b84918cb35ac37358a0341b1672e67fc02

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              e097a5a8e43c00c3893ebb4f1003970a

                                              SHA1

                                              02141676c38d5673c8892a01f1254dc1bf5a77de

                                              SHA256

                                              879701ddbfe7033a642d824c433ebf121968ebde2691e50e9182fbe88f5b6685

                                              SHA512

                                              0f59d79ef6ac95d3bbcb2dd19c0686c54f34de76945d8c447fa50bcbc603e07d9fbf5febcfcf04cb9ba2bdefa9073c7f8bec38d9c9b2fb4e8f18cb400c4d5ee8

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              e0c153048d05e9e27de46cae4d5522f9

                                              SHA1

                                              66f4a672f165963c65ea99a4afd80c5d170c7b25

                                              SHA256

                                              6cfecd96f812a6ab5762a7df288c21a6202b7a244006a101e5cb5f2f0cea445a

                                              SHA512

                                              dc32572f217dad3183ba207de48f07d8d6f81b509479a74625e74e0104c0f9bcd9c3480cfb7a106797908d2d7a664f113a5f6378598f79a9748fedd713be3d1f

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              e94cc1d5b94e0d533968017b59b5ebd6

                                              SHA1

                                              61ff144a2810e522e1a5b2a9906fc5be09a4af34

                                              SHA256

                                              89209f8b8e75c7b09cc8dc775484b196ccbf2a7bedb914aaf6f4b33790f1914d

                                              SHA512

                                              e644efbdfc2a233f21e56233123cdfbea8cbc7f6e6c1b2372cd14fc7413d9e7ac0554e4004fd77a2f8bef0def676527996ee1a168e0c46a7e850a950a47a268d

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              c9a85927b005fed11ab08bfe54ab771b

                                              SHA1

                                              82dbdd2d59030e174a39e1611a4ee08b58df411a

                                              SHA256

                                              e657bcb2f6965cffb980457e826db4d23e88cbda3213b7bae34f936ff779647a

                                              SHA512

                                              184b1fbc490967a397ac821ee2c52965c1b69c64cb81ff9662dc6cfd0143449a93c4f206c0894af2030f423645629750a307fe301e4526d95ccd1b473cec35ef

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              4550b4e99ddab345a3390b7afc70cb5d

                                              SHA1

                                              9a66ee65c279f7af41a0f3867bc86e430cbef6e0

                                              SHA256

                                              2ed7a92a63a09a1c23a6237d2f30a23be658fbeeee1ddb036143345afeec7f06

                                              SHA512

                                              d540629327be0610e2357c07f59cbfac4d3db526abd0d81d9669d8fb2409e47cc437f3d31033642d1854456825752da1f45ed34f48f28e2a482e01242ca73773

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              f90bb59714e24e9d58052bbf79f87992

                                              SHA1

                                              679e52ee740897bbabd812d1e0264d0251feaec7

                                              SHA256

                                              f70a0164ae9290621d7ca372ca03c495a80d37e1a922c6bbb565e91b057dab00

                                              SHA512

                                              7d08fa6a74f1bde05a48f5b1fa774172b0082f448f25fdb7a93309dfb98942374ceab6757014fa7532aabda0ec08231cd1e3ee9060bbc705a52cab695477b4d5

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              7ad45f30ddd1be61ac89086d8296967d

                                              SHA1

                                              e6efca26bcca6100d87090adbd2210a1a3ea577a

                                              SHA256

                                              0e11725dd245c2c7406d4c41cc2a35ff6eed5b0d2a6c18afdd96a6d64315ceca

                                              SHA512

                                              d0be6297a916892c9cbdc815b01e3c8d06cb14c6867e9644b97c16544f9fe5872ad67ca0091820f4bccdbd2650b796ae73d96c66e4de14aec161bd71aae877e6

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              bfd352ebb0b160bc2a94aedb6beb64a5

                                              SHA1

                                              c3484b054bb8d1fd7ae75bca8705af1dc3ec68eb

                                              SHA256

                                              87cce28c5cfc97575d4a4d0e25f0bae0c61ac6c5731dd3930c6f795310653e71

                                              SHA512

                                              a0b7735412462ae982a4df2617603eb14aa4ec5d3fb34c528a9f943b66e998972c9721cd68b9fcbf1820b9463837e7a1ec4df70ababb7b71068a3c51df5fc3bc

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              6626a9f301cfbc793fe8ae3b47452105

                                              SHA1

                                              913c2d6d99497fe7d6a2bf04d83215a0b1c098a5

                                              SHA256

                                              c7c888011ef964e1b066f00a8dc9393f60338a0d3cde013aff84b7bbf4a4c28c

                                              SHA512

                                              6f2e0c4ef62b6e87eee4dc085527ba639ceffdc2360e40cc96ebd8d3376f7d13d6e33f7a8fd948b560f65068e30e48f820181375a243708986282fcd5c6d6cc3

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              1da8599e530bccf17540a99160bd8630

                                              SHA1

                                              39ec83dbbdf8b256615ec7504a0819f004fad638

                                              SHA256

                                              a2c049188d70cc6b9f781095bdd1832388743a8ba3e4bfaabb0d5ff187fb4148

                                              SHA512

                                              1eb4f0e19498f55348220439f6c4021833ba7c17666eb3555c0e58595446f358046ff7571859523c1e86a5101e881758812d50a4cee70b1310b76f4b39311c9d

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              b5699afc0332b5e47cb5a6660fa5f2cf

                                              SHA1

                                              08ff606de64848e86977fb2ba6ef80248705405c

                                              SHA256

                                              88652fb59e0d451481f51d8f72af7852f7d125ad28513a70e433fafc71d71670

                                              SHA512

                                              d5cda8cc37dd112bc1cb2ce96ef3c6522f3718abce444cd388c4bb5a65f8fe2189d4b83eaacb074e43a6b88dad01adb84a700a07ce2af3dbd5a131c65802ee5c

                                            • C:\Users\Admin\AppData\Local\Temp\TarD2C2.tmp

                                              Filesize

                                              177KB

                                              MD5

                                              435a9ac180383f9fa094131b173a2f7b

                                              SHA1

                                              76944ea657a9db94f9a4bef38f88c46ed4166983

                                              SHA256

                                              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                                              SHA512

                                              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                                            • \Users\Admin\AppData\Local\Temp\svchost.exe

                                              Filesize

                                              84KB

                                              MD5

                                              03451dfbff127a5643a1ed613796621d

                                              SHA1

                                              b385005e32bae7c53277783681b3b3e1ac908ec7

                                              SHA256

                                              60c6c49b3a025dbf26a1f4540921908a7ea88367ffc3258caab780b74a09d4fb

                                              SHA512

                                              db7d026781943404b59a3d766cd4c63e0fa3b2abd417c0b283c7bcd9909a8dad75501bd5a5ff8d0f8e5aa803931fc19c66dcaf7f1a5450966511bdaa75df8a89

                                            • memory/2436-6-0x0000000000400000-0x0000000000436000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/2436-10-0x0000000000400000-0x0000000000436000-memory.dmp

                                              Filesize

                                              216KB