Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 16:30

General

  • Target

    729239d606fbdbf178c3ed62f164cfce_JaffaCakes118.html

  • Size

    130KB

  • MD5

    729239d606fbdbf178c3ed62f164cfce

  • SHA1

    596288a2f89da3fd36c079e0942524af5e9b3293

  • SHA256

    c245837ee8797bf9f22da2174016efbe8a9dd1c2f548d7ea41185eccc88d67e8

  • SHA512

    5fbd650ffa122f008f7a37d42adbd29e2b6e335dbfbb77e5910be44721f5bf00725263a6dfb3085bbf183221c8a9247e09eeac138260e1fa9380ffc397da429b

  • SSDEEP

    1536:S4cnB4jUa3Yd8bO+OcMM0n3jvAyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1o:S4iqMCyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\729239d606fbdbf178c3ed62f164cfce_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1252
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:856
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:209940 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2448

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0fba65a010daf59dff05413b9777d077

      SHA1

      9dac70c553ea3ff9803e798cd8895766162b3ebc

      SHA256

      1dbd38ed89957601b6c2f936f2d3cb7b5df4d78c7a59f2df1f5708fee33b7970

      SHA512

      053329a9f81387958710a0f28d4a9880a7e4fde2766711825c18b63d94c02c8c3685ca78a2cb7022e79a43541cea12d1a5948f639ffacc36db6ebbfa80452e40

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c2e6c09cd78615f5ae15dc95b0233746

      SHA1

      14a2a0d99270cdfcc79eccaaec94ab81fcc13ea8

      SHA256

      0b95b72fae275d4db77eeba48b6e62496c68c0b866d7dcbc3b809f4b7652c89e

      SHA512

      efebdfa76ffbf2f7e7a80b5e4c8a725cf389a3ef39e24a8a9314fe6821892205d2a83818a2c143efcdda5d0d1766c96c6b6c3b0a2896d281623bd6beda193a6c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5d7955e7eb38b2968e4753986adee7c8

      SHA1

      0d46322801667ed11bff408db982755efbc394b3

      SHA256

      6bc0dc26a51d51480e60da16fd7587f19325fe4389cab43288773bce446ac4a6

      SHA512

      3d35bf10bc242fb5172ea3785b6b1891b2d72cf74af60f04c827b3ce65473d9b09beaa4a7ed3fd62dfd32ca9a80ef666243d209a8dc1480ab097bd9d16e8d5fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2b4c89ee92f389756bcd9251a7a19965

      SHA1

      0d9f8a5123570a6ed486d46bd4c0b664cea40ce9

      SHA256

      9ac9210171bdbb4e5f2b6bd9d6641c91b94212679619d67acbc2bedb8a04eba9

      SHA512

      1491aa7f59a00cd450b549b89234f10d407b90e576485570676b5594ccfc9fc14c055cb99c40f2be17fe9ed052faabbede55d517b0dbebbf06e35a255300bf47

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0ab052969f10965cf6609d041b4d5e3c

      SHA1

      6a7d20747c202d5ded48b2df85e4d45aba059c59

      SHA256

      002a780ab30306415b4f48817d0a5386d153ba1d0c5b14eca76363ce231762af

      SHA512

      663c76d61ba003ef5e910d4c3798a4c32612b8b3a7d08884bebcc63c7b5bca4c41a9cad1b7e48d7d8f1d5734576997dc880d01a02ab30b5c821d34cbde8a04f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      977f77557012a2d1e91bbfdbd8156fcb

      SHA1

      a311f84cb8e8c925b2cf35a360b253e0b1b253d1

      SHA256

      a761ded1fb4d373ec349e651e468f30b6298cef6dae5d7f542cfee64f4fd8ac6

      SHA512

      907f588e14b2b57636ec36b4f9c063a994dc3ac3d78e1c808db8cdbcd2a166fe9fb58accd802efc7b92deabacea894e75425f49a832f48098a5eef16cf409dd6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c8d96c20da9008cf5ba1208c933f28f4

      SHA1

      d113e8c6ff7ae112b6c369c829fe92f20cac2d00

      SHA256

      dc4ca1893fa145f7aa93797f802df192c34ae0d517035b2dac30cdff18ee0d57

      SHA512

      9397bd5cdd80c04c3fc77a8b7daedb5d96ec870c5bc7691d51ad79bd05848ffb1305c179da7882d3f67929d2e1b2eaae10dee8eb6ae185b7681265894859bd77

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      608bc69f65a4e81a7ee2b70ccbf0e050

      SHA1

      57c78065ada7b9132c7e86bf15d1e39823979642

      SHA256

      02f023065bf5f03244e09deb75ee232aa0fe9bd6d7fe59dbba23fae3218fa7cd

      SHA512

      f1ed569adc4bb08eca46b26c2577cc497ab74858e95636b20ae9ed9c910020524f478f81d162cab8463c3ddcf4b5b26d3a4a1f0cc1bd1a30bb061381c1d8478e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4b6931f301ddb7ec8a0d7696463343e9

      SHA1

      b6e113d7fea605ad99c3bbf5e797fc7c516a2d19

      SHA256

      966f8c59fcd376ad264b641e65adb2dc08fefbf86c6a957714283c4f72a048c2

      SHA512

      b930becaf9c84ccef7f498125c7498f6112ce7bfb111c05faf6ffa0f6a90fc72ab811930fe456e6137e34eccac1f7f551ddcb2f34e8c20b3fb007cc634bd025c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      033b6b035633e0f56087c8ad14dc3567

      SHA1

      20abbd816733cb73655f5fc3a7b139e0035dfe70

      SHA256

      fc64ab246db76e614c630a9ffd3c2626429ee231c14e074e3e45b5ef45ffb074

      SHA512

      429653efb369e2a6b5af859e98a930c9f6976da4b77d2de5439f7c01a0bbfe94075f70d0db24120892b2162d768c92933d460dd0dad6e7549067f7a1ab99f1fa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8c28adc611252e303c31db555608b594

      SHA1

      96af992f39975285270032721ca85493dcb0d05e

      SHA256

      b5c20fdc90fa87b030431ffa6cc19257c9aaf1cb9d1bdc4c630635197584853e

      SHA512

      09f0d266c7578e45aa84bd4d49704520e4a3ba0d14db136d5d3152c55afb85e9cdc2a108e509394d4dfe47b08ac5f647ff07fcc66772fbb934768d9e97c2ec9e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e24a20de429cbd929a452b0101d12c1f

      SHA1

      d8152b34412161d8c27cfcab236238a415fe6063

      SHA256

      c326c702524adb86ec277c01cbf8bcd0991654620500b66f2e972e3c08491f10

      SHA512

      37f64723bffc3f397ade7e6986f5339a44f456100a4c1f7979dd05cf8baf4a39ac1a16fddbc85712192a042b7290cf128cc402e044cdf750f0750a187e050abf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      07d10fe83d70cfd84c12d6eeaaa41867

      SHA1

      6890f9eff3a79916c9974debdb3f3760d6e32784

      SHA256

      4373532001886a960d1e0cf66d0bc384422715225e7c37c3e94aa0b3a1fe940d

      SHA512

      3a81b2ad59558ed92f3de7c8f9eda610babdffc48fb7a20d86c4051f76f5c3ddedeeba3efa25005404932e302a10fc94f9499f50f3546611028bfa1b8b116ba1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4d6d15e24a1433fc659f905e7798bdd2

      SHA1

      bbe4995f5ac838076283f8b1ac70b91bd6746b51

      SHA256

      fa056b6893bcc35aabe6838db113faa706bd6e55af098ef593e1880b98aba847

      SHA512

      e53121c66c8d561d93555a99daca7c14262bea9b07961f0a39c994d56a39f804612af6cfc2194648ef02f5464a541cfedbef2dd2131904072fc8222a3cea3857

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c1ec32135815725edb8e4261a9fa38db

      SHA1

      42d89bc009f69db7414c19feaa1e4e422235b2c4

      SHA256

      41e644160ac5a31985376126f3949602730cb1da6cfd71a90fe758a1686d41f2

      SHA512

      ed7cea237a0b35b9a2af48610abdaaa558a22dd5a8992e65d4cf930d4ceae4a9e01aa1d7efcaa8413bf6bc104a175248c700a45a7a1fe7be48ec0dfd9a5bff63

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1e7f5117a362af8f7a4dd8b6e6545cb3

      SHA1

      ad2fe43249345316ef4146f62fe5fd2630cf4fc6

      SHA256

      95fa6314c07da212a1e3da73592fd3069e88c88e7fdbc65452fcb967a2df2640

      SHA512

      0e1eca2528c9382fa32c300f2fa5167d1a7fa8a077f0828398ecb53712e13b7c190e6879358130517d3926720722e09abda2c0da9f96fb276271f4605b6587e7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      949558224c9f8f1afaf8dd8790d8a1c4

      SHA1

      d0da3b12d1a4c65dc69a89cb3044d378f315c88d

      SHA256

      94863c67b0a2464a5eda983b2987f8430854c3c77d7f2d32c08b2d2be16fb0f2

      SHA512

      f0c0446f7ce34da386af2840e9f6ee444bb8310cb86f045856e985278aa444033c97a3def673803ed4c6706034df912609fef426a0c8d5e63958b65340c57414

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6b75e01ef728c2dded011a16ff45b8c3

      SHA1

      a6e90a55f67aeddb1b30f77b56df616fe41d7b7c

      SHA256

      99893a3afd87b9d9bcdf14e2e6f48e054a6b4711d9774fc75de9b76ca3260172

      SHA512

      ad3a8afc3e22acbd757c2666eb46ebe95bd4f3990223e7a25ead02f44e021f45c45b9d82db3531a48809b7c1b0eab105a16bbebbfcafcbb0981da2718e5212da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0b2edd710aa4df83e16680737c4fe970

      SHA1

      df1eb8b023d301389787e739904fba7eeeded0aa

      SHA256

      447dfb09bb543d30daa35c3fce1e47cd168f1ae11eab28281803370c21ac6867

      SHA512

      23f003c9c8645d4b0204ac4dd3993ec56892882e92240feb000fb48405fa8950c24c84e1afb9b6447139ee83b4918ea67aef8d6559db28239b28e7033a45fadd

    • C:\Users\Admin\AppData\Local\Temp\CabDB06.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarDBF7.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1232-9-0x00000000001C0000-0x00000000001CF000-memory.dmp
      Filesize

      60KB

    • memory/1232-7-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1252-19-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1252-17-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/1252-15-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB