Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 17:27

General

  • Target

    6f477a686759d7f4f36b5f97d834c6d7_JaffaCakes118.html

  • Size

    157KB

  • MD5

    6f477a686759d7f4f36b5f97d834c6d7

  • SHA1

    f18b7fbb37b4585d55d3b57fbd99300ec55a519c

  • SHA256

    297f81b03e86ab8fa21e4f8b9a60f1f0a699f28dd0fb6178fd0cba69bfd8b7b1

  • SHA512

    532250521ae73ee69384c5f45686be0d0bace4798a4070b1b624039f4c299a6cd2fb306370352ebd32642b2bc4b1077c8e63ed27c2324fa055669dc632957089

  • SSDEEP

    1536:iURTdV444kIxA4yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:iG+k74yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f477a686759d7f4f36b5f97d834c6d7_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:992
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2408
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1956
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:603148 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1612

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f80a0aff75474d7460cb44c1efe01cf9

      SHA1

      8f255f09aeadfc9a74546421fe7f02d59427feee

      SHA256

      c54ff2e2086f8098f3ce201f80d695e7fe26adb08c23979c9683f40f1ea10a97

      SHA512

      d348b74aa26f9e7677dc09856416734aba7dfa5fdda639dfc09455cb84b3f3bb4258ea4d7ffbfba3c6f902f18c2af8d3a842c38217fd7e2c2a0204f236a1bba5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b180c77b5f3a481e34d27f8c5a72f7d6

      SHA1

      33a993fe3f7da5cec1c45ae799ad9931a92a0fcc

      SHA256

      2f6e7239341f6f6299b4a0af1e2657044d84a018da55ec99f1a38b21525384b3

      SHA512

      edcf4444094bd3b5c158607870f6c759bb78b351ae55a452336210852cd5aea0c35f3c7d29e023d4b853ef7627bdfbf36cb9411fe5dca8eeac0383c19a19b73c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      21f07d90c2b657dc5b130c26f7c89eb3

      SHA1

      5b860c87a0ddece4829dd1268e332f59c24107db

      SHA256

      ee10f801588557f8ae8e5faf28e3b94cd4c6c55c9436c4c1d0b44c6b5cbe11eb

      SHA512

      52c8c1fcd9a419be508a159098bdfab52a6c6faf194e773b77b07d78067e6a93edbb0b94df25c1d2c9dda10247bc8755e2d2185d8b7f8f0bc1892831687bfa69

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      457887fc2c90751fbb530cdceec74a7b

      SHA1

      2bd0000d243a632b598e07cf8788041d8e7593c9

      SHA256

      a1ff850f905ec29c7ce16598605497613561faeac45d01d3bf0d224859238f6a

      SHA512

      8e33fab71452340ab1854ed22f25acd4ae51553758c3fdce5c7fb5de635cb1bb2cac320810c979ddee1aa35c4ccdf8bc4c620d10934c29e18c8eb65055b54dd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4c2992eaab71e71eda4adca57db82bf7

      SHA1

      13db0cfe38cfbbd27fa4bea0562d7921ed42d225

      SHA256

      33a681e6276b498af931057fe471565128b833076e9a8eefa8d22ee5a0e6c1a0

      SHA512

      77f2ad32a931c43ee95de354c9da9082e070e619e39ed42b73bc5ed7a946d6fb9bd56a98558bf6921e19fbfaa866787dd3782e6ee43e5ce93be3d23b634e786b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      efbdc315a8b33d70422c1c05fd28bc34

      SHA1

      5245900d3f4f29e3ff1458a4a609703fc20f114e

      SHA256

      cb2c3c27f987c976d81c3a69aa66552b1a1287ea1c9db06e33f1699fef07a0af

      SHA512

      5a66c44b48317412919d86b16673b956f3c97e382c0b587bad68ba423688606604df7f921263317b546a8ca55ef59b6ae82cefb4e542409f22618a272b249e22

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5504e90acbe09d47df5bdc1bbc6333f5

      SHA1

      7de7cf4dcaeac168195ba40e2ab45c7bb35c11b9

      SHA256

      ea54f18ad0cef24ab541b05bf4ea4d9ad0dd22c1dde35ce1805b14f4962e1219

      SHA512

      1e9f142b1f50aa633c0e748fc60d71901bee04a9ab61f08a065fbd0d48189063e568273c960222965e2d1515ce38926466f351b38401bde1cd57e0f90639b0c5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1497b5f635296ed8f0bf5ec3d44ce286

      SHA1

      ae78f8886735d35a8f18621ca61808932689426b

      SHA256

      d314864b7aaef05943bffe8d7c416db16c12ef6d4ac95ae9f547558aba1be912

      SHA512

      40dd3aab12edd4765bb84e56ab175b6a340682568e7eac1e755fc32459217f7cfa1836bb1cb89e138bddfc3ca6e666cf9112932998df64a8a2c800967da847e0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cd55400f3d107ef69b163840b3f72747

      SHA1

      503162b27253c6e42812077df39b20079b33d34b

      SHA256

      eb8fb1aa62a9c4ba423ae9282a269dc2e303fb9dd10a53a3bb2598238e359d6a

      SHA512

      e860e9ba1577b54ad8904baee4d882b7f4a4e756f16fba634af730f606860ec76c13089bb26b37bec6a818c02d654ca703c81a921ceea95895e5df894c330519

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c580cc76f625f248dead908f1a7a0f28

      SHA1

      a6b88d79f76d2096c4ddc02d257f2aaff679f9c9

      SHA256

      e4f6dbf969eeca0d2068f7bf16415a66cb0281792b16696916005b22c38f2984

      SHA512

      c20d4de475c668ede7fb3833498b21d22f88516d75b635d8c339289be6a37e7b8c11154736ef70ac8b28fd957a25d039b2ba79d7695b25a06947d54bcc2aea03

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3b6c7a8a1a5a0eb7590728059a577541

      SHA1

      5664d216943585d103c53a26609772efcc1b2c63

      SHA256

      75c1e74584359345027f35c911a13aace0315617c92069e641765632f73eea2c

      SHA512

      32038201f75964b3a7fb9e40099b31db84f4049f590143407aa3e935842b7a0c683b0068e61d7e5113b5fcf6979793d8864f4b85d96b6e4264493442c89bee31

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3ef1e6095c37748d0b2709178e977c2c

      SHA1

      8eb9a56e0562b5fcf744880eb2f8ac946a6a15f4

      SHA256

      ada4713f750dd51ff45d48b0cb7d919605080f755430ee7081f24dda553cd884

      SHA512

      2030868692888000a2568a1ac68258ece29ece265516e445c033f231dd7083b25c9f697145b877ed7f9f785467740f7df5e11b469f01564ac93d2dba06dd9a4e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1f419a799c2d6638161a062c908257bf

      SHA1

      92044c96111f575755d373fd0a8508ea5be9fd80

      SHA256

      03a0e68cb7a72d09bbc61870220c17605e15689c7a7c9ec15d52495439f04d3b

      SHA512

      83f85fe18ee8d9a2cbd57988dbcd9a91a519181ecaad1e706120ddc0ac53839dda44ee031728aa77041e9eeefc74c1214d8e80e55ec08e289e9a05a82219e01f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      05b0f1ef5174132b2538b6e4ecd62ce8

      SHA1

      0d145b8fcebc6a09d360bc11610c1b6c60a584d6

      SHA256

      be679487894aaec4a00411eeb9283f9e72858b8245ac31dddc6bf08265403c5d

      SHA512

      b8acfcd719f483763aa400d03cbc061df92c9f25211db1cffd397fa7681a192bce4fb29cabe16e7be969832376e1e7a12ceb31258802777f2297ab7febdbdb93

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      41b986ef738873ec1a3df5191c67b09d

      SHA1

      a79b36a3c29f1c7ac448c2184ebb0b2d0dde51c8

      SHA256

      39e40c248865869905c33d18978404695cb0d5cb209d0e0914b185d40cbc8a78

      SHA512

      91ee8ad5fa9aacd20e04aa352d5eb8649310dba7a9fe55f2a1653f66707a04e62c86b003b7e3f6a9e7468bc7bb40abf4fb8e3b4846efcaa84dcb4a82338a5d64

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b5890189107944dc774a568b8fb35b04

      SHA1

      e835b4d5b4e9804a3d681289ef3027d698332ad8

      SHA256

      76d792b19027706660f4eaa01e558c2de0497e66056adf0e455384e1f43ee79e

      SHA512

      a2460c6fa58c8b0d4927ab00a150e61109a24ddc28d9764c569f96db852c07f0df93b396f500345e46509fba0e6d196bae58135e1e9af097356bb03704097dd6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4016104553af2d3af1dbe0afc5123edc

      SHA1

      9e7a4f2233c6fc67cef005ef16ac6e4a091c8132

      SHA256

      7d9fc80f7aea2a05abb2960305a2d2d642d6682ddf312783db7ad1cdd8a6d1cb

      SHA512

      ac97f0d3791f6bab049e4f8c988eafb8314c5e3568327d21dcd3ff38b1fd04716161e7751d131091b205a3a07abeb20c79b8878b9018e2b098b55abd5592cdbf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      deb62a8ae119cd41fcba726ef61e74b1

      SHA1

      7f3d916efd4609638dd54f91be1d810344166c94

      SHA256

      6476a403c1982f2ba4c35dce9ba886c6333a610dc1f9eb7553c03d00bbc7252e

      SHA512

      d87949bab976281a035437b8994d22ca634e5dcadfd537f5e6cbb696700bac3d31b7584fe3036472ce0462762603d1543cf80220b21fc25ee98f35b5c237b2f7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      94bda157fc855d0ed66c9c49d4cfbbf7

      SHA1

      be5ab331745930ed1ea43b76ec4a86048be4e072

      SHA256

      edb46f6716aeba2d45378136717e335a06bea493c9ff7d8b5bed105e984195ef

      SHA512

      7fc8e51d2b892477c2fdf5d5d3fa77a931704be4ef36d1265ceb1bac4349bc091c3b53c5bc482b83140ec27c6412badc104eaba469f1f3388659dd5d5dcc446c

    • C:\Users\Admin\AppData\Local\Temp\Cab28F4.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar29D7.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/992-482-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/992-483-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/992-480-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2408-491-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2408-492-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2408-493-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB