Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 00:53

General

  • Target

    73d20b6eb36a37c84a29d0053a0ab5a2_JaffaCakes118.html

  • Size

    184KB

  • MD5

    73d20b6eb36a37c84a29d0053a0ab5a2

  • SHA1

    e5dc32fcc9e06a5630814c55c4c51425b8d13ca6

  • SHA256

    f31daf935cd3250df83d9af7289e1380e94678f08e940acb3cfdc92a3c84a71c

  • SHA512

    41ea0dbc0b1c5c64270ccac8083926cd6e40fc2eb9953907deb0b8bb9a2d57422bdfc70802c7cc4b98e81a9f131b01ee7586831a396b98d89d495a1c01b68070

  • SSDEEP

    3072:i5aQXLyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFis:TsMYod+X3oI+Yn86/U9jFis

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73d20b6eb36a37c84a29d0053a0ab5a2_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2436
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2428
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:209935 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2324

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      87d57cdad9a20ccd5bafd5f117283e41

      SHA1

      37d806a7842d7500c46bb1b210e45c4c38b56312

      SHA256

      3764561d627a91178c35bcfca5bdc95dad306ab760495c30905eb5ed7aba2a85

      SHA512

      50e547741dda7ba173ce1e04b579ddb37df0a8b38be6e36fdf261032bb0b6f23720ec8953040174019e5d0131d39949ad7b76ec46972ed3ca0e34a28a25a7f81

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      85755819fe9bcca3eed9b34d087ff92b

      SHA1

      82da52d2ff864d686fe2f790b9849209141ddc71

      SHA256

      e63a40aaceb9cbaedf7e971fab2223ffcd23a2f2f1167ee0b6d20685b0f22031

      SHA512

      2bdc75e365de4b4554fc72ba0231a0d6ab0fcea24e596eef3fcdef4d8209f19a0da260f0e9c8b3bb94190252eecf916b44c802adca216dfbcd1165ceabdb0f58

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      84d9d4046b668eff1221a4ef17594129

      SHA1

      49fd42304375f8a4e30163582669d1dbf7dba979

      SHA256

      d19f73ae8260479229b756fc3f8143a383349a4bb038cde40a34655352aaecef

      SHA512

      23ba7027a4b7576cd70fbc68183b20c3699a300e461390975f8b2b8d2991cd542207895f3ac3eb9c491b10d3e656765e0e6e3068a43520aa979a7000e28beeb9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ca01a9db7217822d88d3e830aa8cb10a

      SHA1

      e1919efdbe00641b3c35eda52cb40533d95f01de

      SHA256

      07dfe06941843b2243124d070df65ca20f7eb22fee19ad16a6a2b36c2cc7a622

      SHA512

      801f76b013aeb7269471fc1be05da2000eef1e157d7c7ae2dc967f3f6ee81628e1ea2393631972a4933c90ecc2990ff0db8e070d8e348ecd523f2dfc2f76b98a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5867826fd121dcfa32e840ea1ab8a56a

      SHA1

      1ae5b09e75483d5f3c934b6affbca2873d051a0b

      SHA256

      4609837030f373a5429fa4f5b72bb7580e20caf4efaee74ec1981b9ff6643d8a

      SHA512

      573ff514cf988a86c808c2f3826c8296dffe1b7d2e9661d35fbd6af771f8956a6202686827bdcd6617a0c7a528d59255ca4bd2dc933338cdac456f6b6a40926d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f00d6a386f6c473f433e075333d002ae

      SHA1

      fec84ba2a59c5c193346a54ac2b6d8b073e24413

      SHA256

      e2c9cd2286978266f5a051543e6ec71173e2139635ecc7f52367819db00f89f0

      SHA512

      94ccff5bf10e6a7bb72c4edf2b62efbae85e5fd27bf274a1a7c4c593f6251854ce645bc4ef41bf06f3efc593ed98af949c41971a2f8863568c6ac0f65d9be777

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ee02af7ee9dd6c03a8d3624e525a3a88

      SHA1

      38cd8b5b3d60fc930b881dee053a32ff98fd9959

      SHA256

      2d16023b7d7d7f0b75cd2a31815b4ddb9eb0c5f683379c55dfc0f822e9da402f

      SHA512

      d8a35eeee63d5dc51fdb932b97296706fe433326fb0db236c865e446d0fb3fcebb205b0da01031e29e2d2a2ec2a3855ff43259add457aad82f4d0dcc6b051c34

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      adbb5c861b209c2b8e56ad9236321208

      SHA1

      3a72cfd7b1ba65ac0845b89f489ee2c59e236d50

      SHA256

      71113051065fbe75156708039fd784dec1e1fbdd0c779cb6d7ffc01dd16d5a50

      SHA512

      967f9d74d8221e79bc0fb72b5dfb970ecb267d9df4cf877719700529d62f89cc7e3696d20077784c311b0bd51d57632cf370f6ee3698f8f63cb646ce513574f0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fb5f135bc87906dd0413b0f30ce8b659

      SHA1

      d2039dd8de70431614cce627b0da1650c1c19425

      SHA256

      52153a4e77d00c1cdeed3605e9cc0a8f8c2e37ede3950e9599b0b569711f7356

      SHA512

      56fa79c700296bd0465ae040f863f662ef711fc64fd46d5786b0f1fd3af041d4cd92e4ffd7c079bc066b1b1dedf4fde5a8f3de3f1d598db2471d2087afa49bf5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c058e0298ed29c7724db5321af6e1041

      SHA1

      50af1a3bba96937dae000ee188aa726d9f0a9285

      SHA256

      3861ff8f679fb4517eab12de383262e8e99eb3f279d4db7e1d3ed2035cfe0453

      SHA512

      369efa605bd55d7303ae22bd0433fddb506bcc59edd8d5a138358d9c6be18f2021415cf9d4e8e93f7ebcf1436ddca5964a9126cc23783e182e331acb70465bd9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ca7dc32aaf755ecd6d62f39e96eed990

      SHA1

      458042f7b274c48a42c487f4a3edad525649998c

      SHA256

      b9186131876ed1f368146fba63d803784446edd7bad0419583f35ef56bbabc4b

      SHA512

      17ce09e58e1282d9f3f8a067c2f236344f757a7862bf9f0161907e8a0da940470d0ede7654cf709f8869b5051633e6c8eb3dad92eb5852da2b2c9f0974d3a375

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cf81d3cd0e634a062660c49d60d3b006

      SHA1

      93c23ef27bf82c0dfbcfcb5c70471f0e60e865dc

      SHA256

      2d77586e77dee3ce52f9a58c2ae518d337904360d0c49d1d9db1a7546f9d5176

      SHA512

      69faa33fa8ae4b988e83883ad5dde9920b90d494f8a33c36dde8a54a2468a60342457e8d57f82217289b33d130bdf79b17cd6f6642cd2555d5e698b3c7cfa7ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6610552089d5f96fc56b65c9b2a7770b

      SHA1

      e54ad0fac6ae4aa1b04e3fa8122c5afd25f0ef8d

      SHA256

      40add9cec062b0d431787ecd0e3cabca07b26d2b73e42d56e43e436f965f4a04

      SHA512

      2fa7e33334bcfb8f0c8e379a9fcfe63e563f997cfe19c713a185adfbe39f4fb8e156f0c68e3eae23ba40c44658dc9dabeb9ca37b39b951a75f8b0b76b5bb3be5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a2af1894cbcfd5b89609de9889cf59bc

      SHA1

      e86ac0c6d336dd6d6cd6e8002b2b4cab18c181d0

      SHA256

      745bcaa5cd8a2987bf4dce6ed381e3df985b50ef420bb3d796c204fd57d463e3

      SHA512

      e4e31b29bf13158a7d7ee149d3b9ade82304502fc26d72ae07b52613229b2e5e1d6c198b1b139bb63d7d1fb8cef6a84dd3868c44a890c577de7936d136c765b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      eb52fd17132c08fc7d7d7273b6ec8b41

      SHA1

      9b8a7ab4bbe5d2bfe005d50b17222fb161b54b26

      SHA256

      4a6cef8a98fadc01a9df58a76f8fb52e5ef1d8e5ee5d47df16ff0025583d7e2b

      SHA512

      ff8eb6541dd5ae1d992e92986a53da677859b4ac1ff4de24725577818247a44a26df2ee810967444c489963a36fa385953653cfcb4f7720b5a610e47fcdc2509

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      40e48ac6cf8280a9ec38f7947b12ae81

      SHA1

      94644687ccb97e0a33ffe820b6133229564259b7

      SHA256

      a0b60611911e60f9f2ef775bedb8b5227a4dad48c0568af50cbe304dccc6cdd6

      SHA512

      89cd2975ee0d69ff1ac4835d0b239ac0db4e3730afee601dab9aa0e0b123401aa52d5ab0c6db532a3dcec04ae22e21d9eb22e7adce3f693ecc1c7633acf80105

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7a35b5b75eed655b6536d18439c94488

      SHA1

      8d73f28b65cfee32878d54a5dbe7c7f7212670e6

      SHA256

      046ef83e65d3c2b6b7f4e87ee51b1e906efdc4d4413cb6080346481df3c37442

      SHA512

      4198eede719318734e0fd5eb33a3d0f40f7853f65898c1fc017f10e0a5720415e81474a12abc8a76422a2404653f1227d3198e54dd0e7371c097e0b284acaa1a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      018e31420a8dd130e1c9bf906a7eb9af

      SHA1

      c1bc96d2be2fa3ad446bbb886bb4ced243bc572e

      SHA256

      46e09e3d9242973e06870066da2c2c99eeada33b05e397566324aca45849727e

      SHA512

      283e24bea9dd9fbe6caa39f558f81b2abde92ed7259eab973e5b800c72f9a7c6d994f039e138ee0243a87afcbfb16c5bc52c28c4251a3bc1b2844d8be0309867

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      07d93782f77de73109ce321c7d4bcd36

      SHA1

      488ae67008543020e518b3142a99a8f00913e3f7

      SHA256

      72efa0024fb5dcc9ff5bcd38cc4c06fb3c01cdad7abb857ab447921286d1a3bb

      SHA512

      0ff0d2cb3180b7a33d272c39ee767f637423a5fe64a9adbf3a0db304b1672a2b32f3dcedd66c52c2a89c5d91e1858cca4f264d76e349380e758fb3b9ada7ea0f

    • C:\Users\Admin\AppData\Local\Temp\Cab196D.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar1A2F.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      83KB

      MD5

      c5c99988728c550282ae76270b649ea1

      SHA1

      113e8ff0910f393a41d5e63d43ec3653984c63d6

      SHA256

      d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

      SHA512

      66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

    • memory/2356-19-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2356-17-0x0000000000250000-0x0000000000251000-memory.dmp
      Filesize

      4KB

    • memory/2436-7-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2436-8-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2436-12-0x0000000000240000-0x0000000000275000-memory.dmp
      Filesize

      212KB