Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 15:02

General

  • Target

    725b017f22918c02995ebf4c90ddc7ed_JaffaCakes118.html

  • Size

    158KB

  • MD5

    725b017f22918c02995ebf4c90ddc7ed

  • SHA1

    4a23ea1803d99cc9beb664a37a8d92ae17a75969

  • SHA256

    70084ec8b3c7b0bc77f0ac48e6d243bd7bd2a5bfc30d2045cef12350871fe7aa

  • SHA512

    71e77fda77d5c2b57103c99c726144263ad3985b882a121c71e4ed96e2bbb009f08f5f2a53174385acc17ca8b30b40d0b34c6731f0353268b75dd6018da763dd

  • SSDEEP

    3072:ilouCrPEQgyyfkMY+BES09JXAnyrZalI+YQ:iWhgQg3sMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\725b017f22918c02995ebf4c90ddc7ed_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2872
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2292
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275477 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1708

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bafb74674aa52034f9c06cd60e0f487f

      SHA1

      1ad561bc9219bbd8fca591addd6123699590bb35

      SHA256

      d83a62327cb9b466e27043ffaaed2da8b7a99ecaa91a2f4078132e753e1f2106

      SHA512

      f2d628126a34e0415a1b31a137d9c89b97ae74ead810ea45c478e83dd19a4aa1d5e6f6079dc17c444dc528bc26c534679d3916921c542ff6750e4ed69e0d2e36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      55756f073f9273338f6746debf3535a9

      SHA1

      14ce2e5baca1fbe6e0fa22f337ca1b141835d7f0

      SHA256

      247c6b4f6edc572c5f8db7722d18634cdde06afd103336d063e5c7181bebdfdc

      SHA512

      65c6affa2cf7b8ba2bbd1dc4ea3935cc7248ccb69ee95bae73a0fbc702c9f9b5b00ae876003ce35e08037de8b4dae1738e1dda751ffe50b65a2e9cd57e2e7c6e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7cc071fa63f7b301023146cba3fe42dc

      SHA1

      f302783bbb2484871c812fc491d9c73ab18f9163

      SHA256

      c8574b31219d05e22578c6f7dcb180639dd5cdac2c8ec42504b3a595f9386739

      SHA512

      bc96ca166e02c38a30dc295e9f131eb7b31202c35e97a9167f16859eabb05e85626b89e3b74e38d9713d788e3923919b27b6855feb4f0e77f5ff720eb3498eb1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d8e3e35d76ae4e5f6470fc3a85082d66

      SHA1

      c48cfbf9aaa75e3afcb0c068cf668b7ac0e22cd8

      SHA256

      d6c8ed725b459c55d53af7f7c897d7091016929d2b712b9adf746528be3f8107

      SHA512

      f1558fc4af53b29bcf50bcdebecffcc44350dadee37879d9695b1bac05bc5d0ccab1766fef3aea65302a638fcf8aed4e75e77d8b56ef693b9486ecac36827d01

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6f877ad69aac9ff169c3eac78097b5a1

      SHA1

      7ac96730f9602e6036f2f94537be462d6b551d7d

      SHA256

      25de6af86cec20aa1d502075952a8188a675638a9dcd30fee4f559b832603493

      SHA512

      c8a1da56d3d6edd96416e621fba0f39a2752fe1cfb4cc3a02a5f741f0ede52dc76ff369a945ec914c523c9f76e96be3890ab4a4c519cffc2e36f50df43b2b957

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5e63101c1ab63f646337f10593aa6fc1

      SHA1

      f536c479afec57b40408e4dd10fd57880d533dfd

      SHA256

      ff8d5f6b35fd0173aca2411e0ac195362d3fbf66c9fa8e28c732776b94fb226c

      SHA512

      8a4a3811c33cdbdaed44e5b962588d404b5a52243c95c794b2b5507b08a643319d557f8ad152c0c932870da34b3fd888649c208e3e5809bfc1ba6ad208242e1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b5f3eaaae89424879e40e9d9420b6eeb

      SHA1

      c1cede26e867f4b676a898263ba64d0bd7fe5574

      SHA256

      3956d70fc65509da1f1402d936968dfab04ea91e6b2b501aeffd6bf3296c2108

      SHA512

      cfb571a3639e916faa8bf56c7606cdfcb9f181070d4db05424d505b878451c97e4633ced6bbc2fc25d55eb82bf9da2ddab4d8bbc0c749b483928b22df283085d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      58fd5a037fe5365d8cf0a5acedcf6540

      SHA1

      3e2449b31c3ca2acf536ce56c968812bd6c3d67a

      SHA256

      bc849be02217009c4e9e006d16dd48bdc837696ac71a55a92611b6ce072ee297

      SHA512

      ccbca037073c1a1362e573b90efeb1b2b44ffc7145d6d5cfa58169b6f3fedb054011b60f30340f807db3a6f07392a7d10b5e0c347c358587c305768f8294a4b2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      78885dcaecebd3a854deb4aed32bf3d9

      SHA1

      8243ed3dc5f515f57bee2394a8b4d52f1e082324

      SHA256

      9ab51828ae1bb8fd34865e1b05d977889f2ddbe90b61ad3065c94813e8f51050

      SHA512

      ef4e11a354059f6a906e1ae608d1dab614987f9b4af1bf61ca8daa32f4a2ee4bf31fcb8fb0701bd111658ebd4efa6c0ea6cf480104f268002b55eb9110e4ad52

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4d36913212eb3cb83d9c3fa2297bd441

      SHA1

      843748187f75dc2ad4b69b1a1510fbd590e3ce7c

      SHA256

      ae2fd9437c17b491de5a5ddb3d10215dd3d4bcd13860db6682b0dafdef7855a7

      SHA512

      388ad0592604d4ea219f7db21e15d1be862983477e1b2b41cc01dbaf10bf5d3928ecf5472920089128540dec4842d667752e4a64081d45d054a882a2c94f1fc2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3b53b9adab7c68bb44f016b3426356e6

      SHA1

      a6ff001416785def88a00bd8a36c307a8ee70783

      SHA256

      6fcd30281a8fc29f5e1af9e3e18a8c18c7cd77fb4be9ed5f9edda9504506616e

      SHA512

      32a6f91a39f7d8ff0f88b1f30087ce9df15586c23ec55bf9f138bc28ef4db3217b3702deccae36b0382f528a65a1c7f669c6258e6837ebf112607f6119a8f550

    • C:\Users\Admin\AppData\Local\Temp\Cab26C3.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar2725.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1632-442-0x0000000000240000-0x000000000026E000-memory.dmp
      Filesize

      184KB

    • memory/1632-434-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1632-438-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1632-437-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2872-446-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2872-448-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB