Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 05:35

General

  • Target

    70ff344f482a7d47cc6e81fed3332c74_JaffaCakes118.html

  • Size

    336KB

  • MD5

    70ff344f482a7d47cc6e81fed3332c74

  • SHA1

    7e03b603c6bb3d84c6296f872cc8b74c43288e28

  • SHA256

    46db77ca50734e442544e2f036d4d45371b3241a6bb82a2c1f9c6307e54e3e0b

  • SHA512

    11cd3e80a59712027d2d0ea7ecee5d504ce15aa8eff5057190fafeef4ddf0317ffc53969be2d0789233585a1a11468254f4c6f35254b59fa2f26f9df2541fb92

  • SSDEEP

    6144:SMsMYod+X3oI+YbsMYod+X3oI+YnsMYod+X3oI+YS:Z5d+X355d+X315d+X34

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70ff344f482a7d47cc6e81fed3332c74_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2744
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2588
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2488
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2468
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2132
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:209932 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2496
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:865288 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:904
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:5518339 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1784

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          901689c08c96255ebfe402b46fefe2e2

          SHA1

          1921036cd842b24ac03e671b90c3975ec6a087eb

          SHA256

          afe134931d23fdd6fbd08c9b56f66148651967f1e889b1da4b34af97872d7807

          SHA512

          b9e6384598edbf63bf538d3d423f9959b4771ac8afef7f300215928d5530060ab2026b36fa93ae788c66ec6623da18c535555e0d83a85b4f389cb2cbc1bff147

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          b62fd8f2bc6c2d3731028079fd6d61a6

          SHA1

          9043245b9b54816a5d77ab6e10de007d9cc40a41

          SHA256

          37320b06e7ad3ff638a1bcd791ba4c6a8997facf3b78166f9affdc24ddea4c65

          SHA512

          69340a0d2306629eaf086c29b1409e1adeb44d80e824f484f62fdf4f0220fa4ea9cbf33bb9ed0cd7bd1d7de2249628d08a3f4e535c77d3a71e080a8860896af1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          11eb1c4727cd1123613771931607f5f0

          SHA1

          3cb080e14e1729de80a9451a0992da8ef927e4ee

          SHA256

          778646e20421e38dca92fae24602633ead395791cb090ca593b9e65774075217

          SHA512

          053dd84060da60082991e1af4f4a686a3e58c8be62ea0ec85cfb6829ccddf8f0d2b371a10b5c50ec68482c47900de308add65d784b45c3f6e34149cd6f1ad83b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          ec529c0f6fc8d2247e81b423c0c0449d

          SHA1

          8ac41d0e8959e916615808a69e13a39202d08f44

          SHA256

          06e216d7a62aa11c60bf581cefb8d9749b9d91f579dd38042f69ed09da6f08cb

          SHA512

          9e2add83c0b38a6ec9c5ff9905644ae636c9170b15b388b458a558a852e4819865417b4c889f40d27d40e38a7ab807bd31e1f36cec7e584435988839ab24337b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          85c737fa5789965c66b18c03278b8b91

          SHA1

          40e2a453a1bd179a82ecce06334f69db7e3a6e83

          SHA256

          fb72e2344e11fb19b438c424002b5c8765c2af80672a5558f02fa81bb0d6be04

          SHA512

          b901c8bc9509526c334777e27ce367ec04b5c1846425933b7a6fc86e0ec4b16b69443b81e50c546761d5552b7977d02ff6c7bb5003baa1beda8095b85a8bed52

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          49e68facdc5772db6b76f94f10c6b9a6

          SHA1

          5259356f57353f9811aecc4def79b85543a35b48

          SHA256

          9aa5e03876b1f0a4d54a73e2b62efe0cb50696e705207393a102b4de7c0614fb

          SHA512

          6170e81ceec6d9bc663d25dfa395c103594906e4d142eaa9b8ddbb1d956fe0851457f5ba8409594483f5b86e2f549cf25d00effe420106eeda386e6d82ce9468

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          c6a0084c45b5f9b114f60b2a3e3b7bac

          SHA1

          cc9df582628bca12904d666f94882f5be53234c5

          SHA256

          3e22d858b46d99d1edfd23ebc8539f041ba3a25f64a89e69a090bff7cb3fe325

          SHA512

          e33228adc5ed4511ece184795893eb40c35b7825d2aeafef3cac5d77507a98bc5b8db9c9d306b91f49f7f7798cc94acc29903db52cf79bff19e80f1424e4de7c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          4d078b926685f4b3430b518a593aa367

          SHA1

          1063a7272a2b5820f2155ae1474dbe0ac3ab13d9

          SHA256

          0954f9a626a8fda3ca083df6a31c1c02f5336752f8ee880b668463a843f26c43

          SHA512

          ebc2756470dcdbdafb97d3566788949717a2e98b853317465f264139fedb41ddf8ac365bcc4eccf743d8da57ec02c21dbebdc1ecf53bea6831ce116416c9ff6b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          8d3fa4ef8199996e0ff16557066c022f

          SHA1

          a72d51bb80feb0193bc4a4aec1823b68951ab478

          SHA256

          f3dc310952030665ea1d1013ab8c702c293dd82e6ae7ca6f4a0a4823ddaf19a9

          SHA512

          b51b1ac707da1977918c362e9b217224b49b2e0591a84c26da3d65b145f416cddc97b8cf1c0f383064a8fedf5b89228cba584fbe089ad5833e78ac6b3bd199bd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          d68866c62262299c15823cd47d166d4c

          SHA1

          cd2f8790817dfa76c518cb8852c0161b885da79e

          SHA256

          803639ad3b239492728fe7453e137ebda74b32a5b3bc05986b6415395219fb1f

          SHA512

          d08d7047f63198947533f7667bb9a0d50376094029e99be3c4204e683486b1823bccca32756078aa4c9a0b91a7cd3bd4834a46db90033d24c7e6064820a35a0b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          90fa80d925c8eb2511ab9b6f5366066d

          SHA1

          8dc0e27443c69b9207e64ad5b25b6bfe985c1df7

          SHA256

          d7c2106f7f93ead98e4bf487377fe6735f1e85dafd09bcdf7a78dd0ee5e88b9e

          SHA512

          d809c3cc54baf8b8652ce1d36e145f84435b45a5fb3e9821046ee77cd7b31855625b8abc2fe20d4e029523da1b025288e5d24b7d8889b1a881089f56ea8b4f11

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          6d82c8fa3971bbad06adf950f928479e

          SHA1

          32a088db3e45baff63655854ba2c588321310cf6

          SHA256

          8dc981114b6cfc9b274205c8c2eecf8e4423a0985b753a121b90680f3a68cc2c

          SHA512

          0260474160a4e9fc9eef57921889cb0b0d2e4d671309895d722957ee4165cb741d09ffb0b37537b5e8bdfc4acde21359f87b5fc810ca12890e2e54cf161090ca

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          a38f532f162cbabcc43be8a4b5068fb2

          SHA1

          79708316fe37713c80089481db5b7ebd64c2ea7f

          SHA256

          7cad71b4ad8e270f578a639273750f0ab5e880193b8a499be50fabcf8664b261

          SHA512

          95506c7dba868d2c56f77dead724027a18dac52a74cc9036734da113d36eb0da32673d5e1c1504b2b9873d0b393c8944c8bd7b80936bdc05a71279578486d88c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          33efe27f368e9e64df9cac0bcecb2446

          SHA1

          50f46008aeaa3690571414657473812ec72b7f5a

          SHA256

          d34ba3968e0e9d84ae3ecfe77c7969b8eaf0903b09840c7dad2cd90c52895d18

          SHA512

          11c7908efc467b98b8fbfcec8c21e15f8ced6bc1fa318fb74f0ee0335bbc253bd9afdab4979031797d37c6723760adc5766936b1bb291a56a552e1fdfe8a60ce

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          853fdbe4373523cd14caea1eb14eb673

          SHA1

          18e7a4f39427204268d013522b4b0ef359d1275e

          SHA256

          8274bd8dd206e0c64a56cd2bb2b02ab993ccc67764f68c42ed19ab2e855625a8

          SHA512

          f9c7d3e9e911f159f0388199e3fe63145995dfb2689741bd3f012c45a4aa4e0673b849dee536dd3e5aef2b6bdee0fef166baebf7f96a9202373cb7af1f61372e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          d5d67cc5f9dc615ea05e47c825f1b9ac

          SHA1

          81734a1f24464b1606f2a899db4a8543a6ac4192

          SHA256

          123ff68f7a84a8bf9362474053d63d8f09c51ed1f03b264fb2794b30b797b16e

          SHA512

          8699102ae795933a827392e73b454cfa1008ad74e238212c01b05c6f17c0f8bbc284fe8773963a73caf29302a4842d299b664d860a0024f9fc3000078c6bd2c4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          63626f7225b8ecc90496752cce6f9690

          SHA1

          5fd25bd554fd55a5432499de71de3465c2124d91

          SHA256

          22da2f8ab93f5a70dab3e6c4f249bd6347d053c9d11bb5564785aac87e1c7c3a

          SHA512

          8f74cb2c7912071571d983c3bc51a72847719df4bf70f646538c259b1101a88f8d3a13ddc9653533fca8ffc9d46f32f89927718ce387c94405df524db5212eb8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          87676ba609ae696aa8d63a33e893a6d6

          SHA1

          464bc79e5fd56e345634fb0edae37408d0b1357b

          SHA256

          bfddaeec78c1a5f279f42e607124f3ecd0e6beec0c7c5dbe5aa35feec7d1fdac

          SHA512

          3f43df023c82fd66136321fb5a9daac8ed2f7cbf32f8e4c17dd14dca37f5271b43fffc597a07130cb29381243b6efa19acd810048aba5c3d5d0499186f68a380

        • C:\Users\Admin\AppData\Local\Temp\Cab2C32.tmp
          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar2C92.tmp
          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • \Users\Admin\AppData\Local\Temp\svchost.exe
          Filesize

          55KB

          MD5

          ff5e1f27193ce51eec318714ef038bef

          SHA1

          b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

          SHA256

          fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

          SHA512

          c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

        • memory/2468-28-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2468-29-0x00000000001D0000-0x00000000001D1000-memory.dmp
          Filesize

          4KB

        • memory/2588-15-0x0000000000240000-0x0000000000241000-memory.dmp
          Filesize

          4KB

        • memory/2588-19-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2740-9-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2740-10-0x00000000001C0000-0x00000000001CF000-memory.dmp
          Filesize

          60KB

        • memory/2752-21-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2752-24-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB