Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 09:04

General

  • Target

    7179bf2fbc97f7a87921e99df6950cd9_JaffaCakes118.html

  • Size

    348KB

  • MD5

    7179bf2fbc97f7a87921e99df6950cd9

  • SHA1

    5396355b4c0cc29720d3ce1d2418accca8b35b8a

  • SHA256

    c516c2b7dce54ec87467c1c285c8986de3ebb2c82916077d2ef46b80039b9799

  • SHA512

    655a6768ba3bee43a6cccc626e22b4b89aa568eacad9f05c335efe1e2b8bbea00ba1f5450cd4f50099180f71f75386330f4023ef8d38d19c31fda77b0deff1fe

  • SSDEEP

    6144:PsMYod+X3oI+YDsMYod+X3oI+Y5sMYod+X3oI+YQ:T5d+X3J5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7179bf2fbc97f7a87921e99df6950cd9_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2708
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2512
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2864
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2608
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:1624
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275465 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2572
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:209938 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1540
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:734213 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2420

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                Filesize

                68KB

                MD5

                29f65ba8e88c063813cc50a4ea544e93

                SHA1

                05a7040d5c127e68c25d81cc51271ffb8bef3568

                SHA256

                1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                SHA512

                e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                ed418f6a877fefbb18f4725192046d20

                SHA1

                a53021a0266cd0aefe6662d43aae0abccdc8d250

                SHA256

                de79c348ca692ed85330ea97f6abfbc9f0c81dd83f9bd1ae85de1da014bdd879

                SHA512

                b0e70d248b9b59017555b2b0a1fd616fb7d00e1adc83fa33dd5710ef9f25e9b5407cb09f680a5746cb542bc71ca5de868a459c906bb5010caa57852a21521ef4

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                ceeeb0b48ede3dc26fba46d67c5e3b63

                SHA1

                66c3ccda3e50ac3dc5db30e7a64ed40bb2d2d4b2

                SHA256

                a39c350c7817dbbeceb4c0e629c0496a5b0f9ca95e6691b9636fca9f368ae91a

                SHA512

                08e6684b13d2c243bcbb94ddde7931e07caf26092458d7b8edc3cb8e3b273322fdf1f0b19b47e1a0e4ac83b9781bfe4e9ff3d2c59a5635cd29c4be817b46f0b3

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                7d27f9331bfc5f602c4b2c9f8a55441c

                SHA1

                d85ba7084b449674aa9b13095171dddeef17e722

                SHA256

                a29faefee7aa7cf746950b8c86e94dbbc0050f40d5ab3bce9544a423c2daf676

                SHA512

                febe27a9b34514a2ddfe8a9c756e06eaf69ceade5b6a408ec026f544f2633a12af5521ff41b0f83efe404a649bd4ad3b517d4aeead9cce4c8b747804ae2e892d

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                bb7faa0b27292b6184095797aea26640

                SHA1

                292ab202cafaadbaeaa3f93fb799bfe191e5b017

                SHA256

                858f806028d47584088ccba86b7c5896d8458a3ec57e8604b4a187ec2ef85973

                SHA512

                ee967771c61e75167bf287ac67461b636417c332bff0dfd2c1507fc03a551f7029beb2271a950970aabccc92edbd3dc16fc385cd4d82d84be3f2dbae07407cb3

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                309828db4a4deafa69e5f8f228b3e790

                SHA1

                87235570208f5a5e62ca4df98c533fe87b7d4391

                SHA256

                35900532b368706000ced0ca105e1b84fc344483b7a0201984c64e2f88747163

                SHA512

                2c99e55ef9797c7cb812751d962364ff0a8139e67be87e7114de81dc3a4b94711c9e1fdcc21799119f7850e30aa0357d90b491c77baa458df52603b912435aaf

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                a9c8ea4514a52304730d12ef8a9ef190

                SHA1

                021203c2f465c349c0ec1eeb46b83c9e169698a0

                SHA256

                cdae048d17248d07c2b4955740f05c0ba7a6a19466b4a4deffd3496b9d715f5c

                SHA512

                653bf95a4ee86d24257a337cdb9b15ab89a7f878fd3de945f89a568a7b2193174f873c483dee0861a437763032894aedafd0febe111d972e35b7d7254cdb9d62

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                8dd6789faca678ca7cef6a109bb39012

                SHA1

                e967f79113f9ad35321fce5e557a2b86dba882c4

                SHA256

                e0ad625852f0a7188417db9fa911088f176b292ddb776234fabd2e06682b9563

                SHA512

                6dcf3508a5c877684cccf9406bc95f14feb61bc6b3a2792b0fa2317a609a405b95d2f99db63b2935c02c72fddd323a7bdd5e61b5baa4f03ff79422772766193e

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                c22d8f027acb7bfc3ba118d1c44e15a2

                SHA1

                b4aa17cb6b172bdf7e3594cf5d8b7096a2e762c7

                SHA256

                13fbedd70f6d2bb8f28bd0205e4d6ff3ee41afc03ee75f53e2bf199a0379c5f0

                SHA512

                0f2157814467bea9d5eacdfbcd99a2893929620fa795f9c663508af3266a370f1fc908f30209870d7674e1bf1918adf503d66756fe86db9d3d4b4cdcc43c6a16

              • C:\Users\Admin\AppData\Local\Temp\Cab14F7.tmp

                Filesize

                65KB

                MD5

                ac05d27423a85adc1622c714f2cb6184

                SHA1

                b0fe2b1abddb97837ea0195be70ab2ff14d43198

                SHA256

                c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                SHA512

                6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

              • C:\Users\Admin\AppData\Local\Temp\Tar15FA.tmp

                Filesize

                177KB

                MD5

                435a9ac180383f9fa094131b173a2f7b

                SHA1

                76944ea657a9db94f9a4bef38f88c46ed4166983

                SHA256

                67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                SHA512

                1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

              • \Users\Admin\AppData\Local\Temp\svchost.exe

                Filesize

                55KB

                MD5

                42bacbdf56184c2fa5fe6770857e2c2d

                SHA1

                521a63ee9ce2f615eda692c382b16fc1b1d57cac

                SHA256

                d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

                SHA512

                0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

              • memory/2156-19-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2156-17-0x00000000001D0000-0x00000000001D1000-memory.dmp

                Filesize

                4KB

              • memory/2512-26-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2512-28-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2512-22-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2512-25-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2592-10-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2592-11-0x0000000000230000-0x000000000023F000-memory.dmp

                Filesize

                60KB

              • memory/2592-12-0x0000000000240000-0x000000000026E000-memory.dmp

                Filesize

                184KB

              • memory/2608-29-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB