Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 14:40

General

  • Target

    6edc9ddb01cd17a29078bdd32a550120_JaffaCakes118.html

  • Size

    120KB

  • MD5

    6edc9ddb01cd17a29078bdd32a550120

  • SHA1

    1c4953b23025d7f5d3fa28b11f56db2fc47f345b

  • SHA256

    4e07305a8b0d931854751c0b1fadf9c06f8346e7e753289703fcdaee788171f8

  • SHA512

    c3fd57f832a624d1d681eecbb230ad27b1145251e7715305f8892e5f29c936e8a5947c7fbffe1c0da813e7fd4f6290066d90e2fc9344cbc0c78c5ea7c1714377

  • SSDEEP

    1536:BciUF6/zizyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:B8yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6edc9ddb01cd17a29078bdd32a550120_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1788
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1820
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1888
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:406547 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2920

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5b6bff889cf78a10cb835818c125ed93

      SHA1

      31858406163705760dc8255419a4c4073a1a9a7c

      SHA256

      c0c8b86fa203aaed7f00ef13376e48313e7bbde7349ca2dc1920a37c86cb7f7e

      SHA512

      307136e6df63cceae3b547013b266a9d3776eb8f808b24c6877663f03b0e1e91a001cc7cf9acbf86d733dfb91c34b20247a25fa43e932a193b58c6b6d000cb10

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5fd32f8bfd460e635b9a60fe0a92f490

      SHA1

      6eb0abd3ae37a776100b89ff5abb759774fcd141

      SHA256

      4c4ac5070c1a2228e1301ba786bef566f3cb65a2ebc4455fec93d303f8fbc8b2

      SHA512

      fb82cf4d75cb2535e69309c137386e9240039fcda0b0ce4c3b52c16a2ef822b40de95148479282be75b1fb825d8f6c660a63dd2d23567312b17e9247bab3b338

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2ff6af885cdc24005550b5a923145511

      SHA1

      dbc60a0294524fa37445b69fb71670cb4f19f8f0

      SHA256

      499af4b45a8b584ba35c65f41ef60f99685b133053065a28696560ce233f471a

      SHA512

      ba13c55c90e06757c391a044805af835972db9bc3e6b8d5a6781b684293c8169ba3219e7bb28cc04d1ca660f02e434b0f07da3075f0f405dafca0da84565ab3d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2df34d1c4c49797d37cd6003126c9fcd

      SHA1

      da0105a41a2b3652b02e7a39701ad6757bbb3066

      SHA256

      f23ad88a52994b63c6af525ae13cacaaf44c641177bf28f861229440ec9aca55

      SHA512

      9349ca834e4f6b959bd68eeb8a0f3d661ce5738058e49c43e8eb33ad0dbf4441c13594418f43758d2ffaf7e3979905ed8fec222b3bfc3d0c036ecd5798135814

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7bf9ad27aebd839d0769c5a89d43e09d

      SHA1

      e6670eb3586c5a1f1eeb11219858109520e160ba

      SHA256

      1e1724a48d2ed29ec3ae2d979c8a0543bbd024ebf8566987c9befc4c49899e2c

      SHA512

      465bd77df847cecd4099776cca3d9b6cbb0e4aee5d0321773756790d97adecd68f34d0d620b283191b64db6d330a31211b1b9885e064b258890b4e49fe9e4e2c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      de3c3fe88aa52748920649af75ff5977

      SHA1

      dd3080aa85f88a553246e39e97e6299d7e0056a0

      SHA256

      87ecb37d81fd55b3ca83252c7707fabdc6ed6cb147798a3dfef6d7704c77aaac

      SHA512

      c49bb604fe954fac260aeee6081d6b6c17f231f8d122f04f290dab8c8226663cc87450ad18e31457b2662f154ac1ef23061b16e4a1752c535b1273608b8d95fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8aa8cd19ebfbec2fa3685e9d2818308c

      SHA1

      a6f130ef6b54a5acd9bae26e6fb4b8826938ff4e

      SHA256

      ae656635a7d0b547b2876529343c3598169e41fb5ba5370f8e6f78407420f569

      SHA512

      b012545d69b787602d86dd0021cd5956ee67f2e45a4f5310718b32ab9c1186faead5e58418c7b17e12eed009b27b2ec1d32af49df47dd7719a6bd24361254ed9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      880ec4a2adc88a6ba74cebde16eec6df

      SHA1

      1c6dd78783d7fa36f0b637ae2746077c1d29f992

      SHA256

      624e06588e48992d30b4d892ecd37924b6d1663a92ce7842e2babeae94d6e09b

      SHA512

      ea6e0e953d676104ed04c330d545673cedf4fac04c1708aa5796e740948c22f4c17a0487f72a49a9b25d73e867a28bd3ce918c92e2759734a1ecdc464eae4201

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      24e8e857ed8ff04b1782a513f4c344bf

      SHA1

      36fd1407bde43f26e3ab023aeef0601c5a0f1562

      SHA256

      d31a50c5e75a00ee6c421e8a6a24d876fa00169dc8f7c9e856b56e9870f4510c

      SHA512

      c49f598f5cc440cc86b454a62e40acf5189b64e865457540f8c0e390fb1fc971933fad6ae3bfdc1810cf5b3ddc8c1d623ac33df085dff98c321ac2fb36b02215

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      95df3dcbd19c9e7c55e8cd5720d0b498

      SHA1

      f29ba0dd3e8b692c90b752d0d2698390e3581606

      SHA256

      81da0397f8a64c634a72d60c11169c95cbb455f7b7143b4747426e2dc4348ec1

      SHA512

      ed176ebdcac7907b67288d6616be885f53a76f7a3746095f5d51bb2a5a70901e42972d5c1f7239c3c3726f4911dfc8e533160bf5802051179dbc06494e974975

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b67416f07bfa9e82770b41c63b7d2ab2

      SHA1

      9952024b08520809adddf7b0c11198c09f63d9f0

      SHA256

      b490f1f3a61877132a752c7b3eee04e53fd8acba6bdf1510083a3b51a8682c4c

      SHA512

      b0ef0530d5c43b9985565649d15a13b17b5af0acc3cd1905d341b9f9b1b0c5cf1f0fb60ac3c02b2209c316cda03e622c15896b3d71540fe33766655646bae772

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      54daa8211996e100b580cdbce76f28ee

      SHA1

      d47657e890f4969ed7f06ec7cfc0a02b46eca6ec

      SHA256

      d139c317e27aebf0f9cde9ce03749aae1a1ffe84d7ddc2792403ee5fff8e1362

      SHA512

      97bff53c3709d6395d0896f71b952c21ac0981c9aa386deea6415e3e21c17cc185ca7dd52dc08492ddf615dd53c2c9e7a38b17e1a60a2ce2f8bc684796f0d9bc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d783317b0dea2bf62882c92af32adc5a

      SHA1

      0614ec34f4b5f4b6342852d15281b0322da55eec

      SHA256

      07761089146498cf19498ed9bc00aa5ced09902c3f6b81b3f30016f3d69bb134

      SHA512

      d763adfeeae5548a43e987367071b946aa8d7f3588568bc0745328b1b0da78163ef9f4e96fa7113339d289f5f996c8e4db4d70cdc90b80a485c6bdf9e7f7ebf3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7875669da0f5c6604f32ed049c9e0551

      SHA1

      84e65bf4ad26ed9486557f8c69d49ddffed27b40

      SHA256

      69792793dca2e99df95f6cd55e0e8efc895f72ac09bb42d7ca4f2a7d46ddc27c

      SHA512

      bd1d5cc8cba8f4551b17b53b5b84c0ec962cd6bd17c4c8d169d1ec2fdc41c73fa9ce0e38454a88e058bf98149460ab21d2fe839c73eeb4ef4932b18ce29959aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      49551492a18ffeecc7734596709aebd4

      SHA1

      178f8aee8c75480a620c9eaf93847dfd11cd7fc2

      SHA256

      d778456096ca1886c0433752ab3b9d7a381db974ed70e24885bb9efa81be14a0

      SHA512

      28cabce7f7c3f13d194a1b7254c255353fdd8ba1e73e7300cd0e9e4c871d9837bbf22f29ea5535c184c06417d02bbb01eadff27cd5475050ea7a4fc214fdf862

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3b50df2e24ff5a9f7cd1f3f68d37acf6

      SHA1

      28f7ea1d7ed21f874b77d2f9afbd8bed5100bd71

      SHA256

      b06106e83d5f1382ddcf764b6ef982c7798c5d3c0090ca1bf48b28a32b79c369

      SHA512

      d29acffd4b929eab9fac59e3cb24dc49e845a8a00c4227e4f9d80f32f2a234a1c0681593ca80c42c639a8886f81df854774997850efa77279cba67c64075e91a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7a836c57834d616a67952b3d9fafdbff

      SHA1

      d15acd8198ccb77f592025c864e574aa759bd039

      SHA256

      813d2eac4cd7bffcfc223c8af95f306d762190a03cd3851d26db611cb90c3900

      SHA512

      48e9d7a935a2a7fa1cd36a393508c0efd57c65da972a0b980d07cb8b80eddc08ab6706f2cdb732a400d40bdfd549b295901acc3763b8562495d1cc69f58b63f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3faf60056fe2a191dba0fecb59b7e825

      SHA1

      98124e1dd0a752df35df51f2887e1f5a226d79d2

      SHA256

      51ac043e17e1c6135525136986d812acca6bd2c31bff65e7593d4d1cb35cfb04

      SHA512

      7f6238af62c82a63b043c4f535488838bc2ce0ebe529d3cc1b70d44a2054f015779da719bd082decd57cdcaad0f3ee19f5856804414ddec4f359e7a4d4624fb9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      be234fe0801bc08d6d914906e3b06e73

      SHA1

      25321bf75094f810e767f24dc7b233967dc13fdc

      SHA256

      baecd350a4e9f9e18cb0273a6aac910e30f006e2bc9b72e765c761d90a427ac7

      SHA512

      b13246fd143d9e0cf72e93f047b66e9ecbd3dc95ff3a55f9f4b9c561a48dc87940969df1155cb20da4ce31d6011d663f7df780462251b0958d509e378e4b9e8e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      79969c80e1afb68dde717df551a14e7f

      SHA1

      6c9f5e68d7087896ea0d105960d3fce916a015d6

      SHA256

      30a2eca7d6b69e6bd5b3717eb216542f27dc502caf1a439c583f5b5ef0bce340

      SHA512

      6699170b8762cff5bf4f3788f8d8385d37b566186946fccef57eccf43f499d4485599fc52956486d0d78c77f086ccca4434d922838cb9131c3540bf99647f55e

    • C:\Users\Admin\AppData\Local\Temp\Cab27CE.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar281F.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1788-461-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/1788-460-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1820-469-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/1820-471-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB