Analysis

  • max time kernel
    129s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 01:31

General

  • Target

    73ecb1f55ff1e17ce8f47056dcbe1f61_JaffaCakes118.html

  • Size

    155KB

  • MD5

    73ecb1f55ff1e17ce8f47056dcbe1f61

  • SHA1

    0fec00670125fb07cadda1806f524eb6e23d3f66

  • SHA256

    9880a46bdad2bf98adf7aa22b2885aa1154b95ffb20b4a33c68da91396112f54

  • SHA512

    b18a12c370016ba8971a626bf74f59ee0cee5355bd766148d144c2c8b3b56e7b321a34b695efdaf9bdae1a4047d299bdd71bc72b617f458867d26a5448d88a5e

  • SSDEEP

    1536:i3RTxXkQAVt+XhyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:iZX8tihyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73ecb1f55ff1e17ce8f47056dcbe1f61_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1692
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:344
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275471 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1520

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d7c9b04e718101c103d49a1c9e5d4a9c

      SHA1

      ccf0a3909104c0efd1578cea3ec53f5b5708a954

      SHA256

      6358f9ae66dd88c02303dc14a134b538c536b7ccfce5f6051235193aa567d9ec

      SHA512

      0e23c847ba73df435a33af9e54808ff775cecec85230b2f5726ee293029674570ea79c7584e01846fb24fd97817d18a8fa4ab939340ff82ee5d1ddcb64416d78

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bf271bb959deca2f8bdc16901e44d9e7

      SHA1

      bdfbe9f447af1d9af11009182566c803afce7a8a

      SHA256

      c62c821e6c24a6659aa7c2af647f42ffe6a3171269a7032c6f393e2bba67b6b1

      SHA512

      31072014f7f6a739d23c8fb4cf99baf4d1c5dcf718e0928e1673f7cae160333c1cf6f2da37bbcee6286bc05b483b3c333f684995cea101df63b8be9010912f0a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ecc11830ab993fcd6e27b42b29de6fa2

      SHA1

      1f601f9abcf01e19dfdfe9998b90e9ab8c4c2c8a

      SHA256

      4ed7a1371e897851eef619b72c79077faf30a45a0de1278b7c439c75c930d363

      SHA512

      f345ceba3993e032c92f50854be8a8308452c7314b034d5992b3a88ffe7c08329b833d453487fa086935daf68c2712f5eef55e2c4b8e0a6a8b64e8d8770f50fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ac59a74e54553e7c14c421eb2b9bcc03

      SHA1

      c122a03e7202b655f2e0fb477d9ce2b792c87dd0

      SHA256

      7dd110f99c5243b8acd56f806b5678b227dc5cfb225bcce10a61ee5307eb0f06

      SHA512

      b7c4b96ab64c12b3b23d98e198c85940a978740f00af403759e9a3cc083c98ca1ed8305499a1d814775478dbeb304b516aeee97b07fac45cbda3a5db62f62430

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ce4d938f642dc6df6886ad058e0a430d

      SHA1

      6c3b734dd5ebb9416cedc3e6121c4b31fa47fdb8

      SHA256

      3e9b0922ae0ff85fd85fa5e04b25421b19146cafafe8992ff889b6c6eba1e491

      SHA512

      3f2785c3f128c3e35066bda46d178ebc43076865b1e0dd7659d71e196e71ea4358056514cd330c536d4bc51ed501a249e38635b96344e408803842335e5daebf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      699f0fd5433372ee5c9018c41041f212

      SHA1

      78365cea5bbfddf3186a9c229851c67b1834853d

      SHA256

      0df9a1cd66da21f3b29f3878092e83beb75e782032080700ad847216abc96bcd

      SHA512

      e78bea6b14d367136bc1f4d40bd16da8046a42807819297bb9f7e3c64ba284895cd34fe2f76b010214430d6b30f309d469aacb9657deaafc743e80352a65d739

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      54d5e628c9762809e862cbb6d83f4465

      SHA1

      be6cf91ec808b00f7f2aeb380169c84406f812d4

      SHA256

      e4bab631d207dcb0cbe62f33ea00f204cff216eaa658299bfbb28440c0470427

      SHA512

      27fb8ccaab40139a057e9c7e3e30d813f6a9c3399d3989a644a058c920aeff18d6c36e12eb1f8324eb6af407c37a5f8fc87d254eec6a564b74b75f2acbd68ea7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ce9644e73d66b64b196cb74a492dbf66

      SHA1

      138d7c79997aa8dcf2d49f997afbfccfc242785a

      SHA256

      e59639080d160a2bf4bb3d6a2ea0f76b2b7e95833602a9bdcb97be0d7fafef20

      SHA512

      b4b41ce75594c226e3798118430e381825de9e9e52f90cda619b4bbaaddc3bb70b88b66102b34cc904d4a1ac20fa8ecf4a08508ac62e69e8a049bc6ffa8df3d2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      46a9c8b477cedc7d5ee325e45ada27c6

      SHA1

      2c194b57e80891030ddb2ee3e5fbfe3cb04c8828

      SHA256

      dfe62619a07a8d795782174c814ae0b47146dd13c32b3cff26568cfb81b1fb23

      SHA512

      99a698c51d895e2649e6f57607530b6fab038c4de5c4ac7ffadc840b91d45a146238840f54445542b9dc01b503d43dee28346ae0b76b4c46e53da25152f500f9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      35c67f0ee31c4a1012560ec659fd3090

      SHA1

      17c1518e101d295085f9b0d9f3493074cab03e86

      SHA256

      6504d2a0ad0923a6f312474480c95e7b9e0c172dac4ef9236f1b5a4cb1f3ae98

      SHA512

      52328bbdf7e06b37df7c0e0f3f67e31226805f4bc11c04a4c206ecd9eaa4a9f0d738ad8b795b6902c2a7660b949ddac8eb35256cd90348572f083f16b3f4c835

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e2b3ba834d62a30c6eb7503515eba740

      SHA1

      0d19e34a08dd660700d9131e1668423c1f8ec9c4

      SHA256

      7677097a54841c0a07bac313c06afca19b336e0f085057a63d2245ab84415d9d

      SHA512

      693b3ecacefc878ef66beabee9fab712ab9d577858e1840decc27ac533e38b2c62909b00c959765d9e1807e494b31b651c4842ae096a16650e8f18bd8ed1d9d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8041f311c0bbcf83c882618ac0248a66

      SHA1

      fc1f7036c22efabf706df4eb5501c6b92e8a76a7

      SHA256

      223ed75d5ff6296030cfd33102551f5b63734d7ea5a577c2118cf4f1007fbcfc

      SHA512

      46d27c409f6ee1c636ea7dba7cc463891591ba7886191c6494fb26eabcbd5b8b7c63a607c82f313713f5a8a5671481e2254adb4ceba132a8b6f218292161312e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3a91a6b851d5b1d57b03e0fd4bb13f93

      SHA1

      352217c9b1e3661d35c46ba1dc7c2f661d3dc6d3

      SHA256

      f06c818e7f411c6c9a1da1dc85ba429c067525ab1985bbef368fddeb2b33ca3b

      SHA512

      7ab8d98c397957b5901231182bb7b725ddd5630fbf5a34389e98f40387960c899d445a04181e90a8d08c8618bc6fede588b07c90455a8b6d1752dbf757d972b1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      339b78639def79c574375a589401edaa

      SHA1

      59843c48f26d1b4bd0f79437a80d2afe16fa4b01

      SHA256

      b24e749e16c34ee4dddcee7b5606b914d32f4ce8901f2c620f3acc43dc2d0232

      SHA512

      08c7eb20fa10fa235077dd9e4ffef4c671df5a412347fa905dabb416c1bca55cbf15ae248cb7b02739ecd42e03e8df3f341afb998f57f23dc26658e6a094ea47

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fcf9c8cd8b4ae1a9a83950fad5525024

      SHA1

      3c02e83e7503e060e4b275dd2a9f175138aa54e7

      SHA256

      8306295939b65bdf55cf134368dda5ed1a2e9d341312f166f3b82b5c20cadb76

      SHA512

      fd5d2e95bf7aa44dbcdf949b2a124564150883bd658fd454cb7442fbfc528d468f799c1487d0a20e726b8e9149e911a26fd76cbfce4c25298fa6fd0b37b756b2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      68c2ff1caefe43470bd11126118c2a60

      SHA1

      b49f26feeb52131e135e7d1772b23304ef295f25

      SHA256

      c24ec9b7300179b1db1a5b89d7fe9ade08b2ec91e5ab240f8577264b0ebbb3c4

      SHA512

      a0ab1d32c8dfbe2558f58ceb792c3b7cbd29c442b61c8f8facd0951198c48046edfa0a7f1a480c6f8173856d53b56a05b1dc7acaa1027f628ee773134fcf92ae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      84b286b105aff8df5ac0d7970bd07f20

      SHA1

      059c901bacaf7f621e33021d86fad12f7f8d91e5

      SHA256

      94569d393666a11b6d71d36ca58e541703ff61fa6396691a83e9223f60cba1d7

      SHA512

      cece1518a664ce60c8f769c0783f28789bf0447b9694349fc877e3835a93c45b15ad2ab2b72c30f5414e32d3b8a05eaffabe783a8f695b5a5d526bc6f2cfbf2e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8cd8201ade151e9cf67fca7dc3c1842f

      SHA1

      cde36e4beb4703e3c2a2c55573aba766a28f72a6

      SHA256

      bc483bd6435ae15d93192617f585f069f6d95602f5a4f64e08ba316f67b8784d

      SHA512

      bda5883ee80809d89b45bc3a342f342ed9af991c2dfcc9013edc02747edcc25a7477c724fda722b80b659af96e97484de0b8409dd9814516546c24e481698d68

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      017e93b92da64ee2d8fac14466c3ecc7

      SHA1

      0812b00c89aae5c854509a3b09849a99f092ad98

      SHA256

      f6f9c16c89fc67e15b1e349f1fe25404cd90db84caa651cba0d2906f6e1de650

      SHA512

      d495c82bf5370a4bdf3c83c2aef238316781c0831b5b434d6d7aefe3f845b0a9da49cf5f52073b9e0486d79e28a12404ec38cec6fd151080fc8767ce2992b577

    • C:\Users\Admin\AppData\Local\Temp\Cab1008.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar10FB.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1692-489-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1692-492-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1692-493-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1692-491-0x00000000002C0000-0x00000000002C1000-memory.dmp
      Filesize

      4KB

    • memory/1912-481-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1912-482-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB