Analysis

  • max time kernel
    132s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 01:35

General

  • Target

    73eec6f016ec627a35a8176c81879a83_JaffaCakes118.html

  • Size

    159KB

  • MD5

    73eec6f016ec627a35a8176c81879a83

  • SHA1

    6808599dca1ba1deb38f534f098f030a76a64645

  • SHA256

    f359ab0dc2176147e9760834b26168ef2046bd1bc592030c29b473963b323831

  • SHA512

    30274925da5e021b67f5f54e665b0cf2300f6db082e2ab493613e4ed5e8f8a9d0db8260fd5965b08dd0eddd9a6f3cd362ca7af7b61e07a858d0e40529ecd3491

  • SSDEEP

    3072:isbx9Zj6RqW9yfkMY+BES09JXAnyrZalI+YQ:ikV+RqWIsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73eec6f016ec627a35a8176c81879a83_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1684
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2076
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:472081 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1704

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d5cbf2101d7c9c9b2710dae9bee40bbb

      SHA1

      41b3671130a55de43a9be7b34dfaf6cc4d4c0349

      SHA256

      9a5e102300f4a9aea2876571865d3a041bc07030260616777d7d8ccd6456c92c

      SHA512

      56ebe770a72078ddf9db6a93efc7d8922ffdaddadc38c865d2e4d0190831fdf619f158b9cf92b615c03db39f1c0b8dc2df5499ac634e15d7abb13eda90263fc8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cc80c0e1c9fbe613ea1287dd614b3610

      SHA1

      7b02149b774e8dd8e10a38d126f047b6cecfc60a

      SHA256

      37d8d947e5616181aa85c5ece32e49896967d6839496824cb19375ca3c6c7176

      SHA512

      fe2602e3e749524a9160a677f392c6738a6ad112cf3eca4bf758eacfec41dbeb684849f3b5f31868b6d091cc154252863e09345b0b606cabb79b8cdaeb3f88cb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6297e273f4b6c13899704efb9681f0f2

      SHA1

      2af531ea6eeeccc8541280ac120fc4fea508856d

      SHA256

      601b8c2bda0785c47f8eabe9645d842b7f41d455a738ce370ca67a3c28d611ce

      SHA512

      67a206482ec4dc0091e3255af8639d2064b8f6694906d8e60f75b3bae3b553475fbebdde62adc830d4f2d1678207a9df77225c782a813221b15cd687e591ea60

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b4e30d1bd75d67518bd933bf258a7e27

      SHA1

      fcb336c852f3450d9052ab2c7b71c9443cf61b8d

      SHA256

      8e284a9da7f4ad789df10f22c4df378dab4bb58864ec18d70404b4e621fbfbfe

      SHA512

      366c96f508114cf4d4cd47c636a522fcc801ac0c7beeb321607444439217fb1944e7048a6db1c90fb7df613b35aa0bc67033ca1c88e4264497bcbd128cb673dc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5312c6db086aa5ba47c7ab7cc9a88f27

      SHA1

      1ebf08199661125941b8b940bbdf7d8144454cea

      SHA256

      1bd957318fd16bbd1eb6f8a5e28be33d1809602f3d396b78d84b6ef5769db541

      SHA512

      423d329bfe6407126582290c2e3a230346bd4949cfac5465a8463f3c3999263f0eac32178f262d68e63b7aee026e3a04edc762d12de97f085b282f586ed5b127

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2f917eebd6320d8a5207c3adb9131843

      SHA1

      beee12cd6a486e04e114b5df67d9aefbce2cf1c1

      SHA256

      7386393ebd08d4030701bdb046301f3463dc6554428863fa8f4aa9609072ea98

      SHA512

      7042d933248fc0bd404d4e564a96d6b2a69ba56a4956fef1a64b674f384cc529f96c99da603656662cb78d1cc71e776b0be15ff6a52c2080515bae63adb13dcf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      21b5d3322f42afb192b116544f2d4fed

      SHA1

      ebb9851a094aae8bfdf06a3e59bc72b3951bc4bf

      SHA256

      e8756cd9170df48bc816c8bc67ffcad059d027daff16af27d29d5367e9fde84b

      SHA512

      76b8ada42b92aa8154f0b1779d0da898614b8954775fc3afce2186648da00a80d5383921838e087cf4aebaf0f71161f01cca5a0e8a16f9bf49ea202d3a1f7e36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fceb161da0df958db4bca440e6de3ea1

      SHA1

      47be1d5b507b6d759e38c25045f231a80e86b24e

      SHA256

      3a97ef1cbe7b012940e303462335e118e603deb7bc011ba626db9f4d11a10e5a

      SHA512

      b4ae505434e048b62e13da5e54daa479ad568993fa2aa80a9aa6a7f5793dcc7bf60528033236a3e60c3ece7670e815ce3377af32475aedd15ea6bee9502ccf67

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      644a6f844aafd5a0b3ed2a9c24626853

      SHA1

      009c15188b5eac9c98c373e73e390445eda6310f

      SHA256

      035ca7d593e2245475aff19ae833566dfd6041c01248a49c05a832f7432c5d46

      SHA512

      a02664ebd0167efe263bab3367b57a4558b7b852da99091fc68705d2fc27e026cd1fcd58feba99c9bd55808c3fc32fde233aa7735d24dc30e4dd7fcd21cbe1ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1a791869a15535253c9a9060caa72138

      SHA1

      565a7f82141df73bd35f7f4f4c9ff1ca00969cd7

      SHA256

      a6a3266f73c723699179562777541995210015bbdc605e4d94b330cb22234bed

      SHA512

      ee8a45fa04a15bbd15d69aa6827a946a8e70a7de67d57ab28536d719a4ce6859e6076e5d6fba63516e13c4d6240728fa98c914a66f679b5a2558594bfb5808dc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      217839c89e8272cfa3aaed70459a1771

      SHA1

      e23fed2de3bb891d9113a3da20d27d92d33a46b0

      SHA256

      d76e7d426ae9535b2a9b8a1db52891f985fee4879a9ce8a168a190e636ef0184

      SHA512

      9efb10ae7fa0dea8533447a63eb35dd4c6c1c3bca686091d6892399c07d48a031cef6cb9cbcb6158616dfcf1bba70f89d46473826798b1d1e6d0906dddd4a63b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      aaca789d9e04ae574baf9087516e4339

      SHA1

      e98412ba6e454d69fec81ddb0f9af077148c9625

      SHA256

      90300bd0a336802de66ce117823abcf541dcec723f509310198d0e4bcc16e1ad

      SHA512

      3904a919ac0694809b1b17f829c8681c9a3803c81b51c4723bec367b003acab505bfcc8e4070f98cc724e1eb74dd2e8e46cd43c531c5edaae67c84f8c42c2ca9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bbb6fa193a817dd4e0e11be8a15ee845

      SHA1

      c5d16d0683120b1f14d460086ebdca7c76d21c03

      SHA256

      a2c0e749bfe7022e4013702cc3553ce37a988e1571facdc0e676afff21ae847d

      SHA512

      e4c25f0beb5621a6a01b8ea696ae8864c731b5d499d23383350c947848c6a7097b95fea86f24742e036982ead1433e2b88d7f01c4de323f33e78cc8d49cce295

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1ceef08831753cb7cc4257a8ac8a6af6

      SHA1

      28bd68e0539149da414df32b98bcf54ab448d878

      SHA256

      4e76e16eae20c0761c32928474f75a3c90a114703ed1dce0e1669e07e2d30b77

      SHA512

      8d56cff6f514b5f280922df25ce5fe2f8d20b6a20e570d8bde2c4cab5cb2966a8bfdbaa1729254f165920b8cf730d54636254cd80f7205d30ab9ed12132512c2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      69cd7100b94e1f7368e464d67f8460a3

      SHA1

      64637a6f9c6d9abca2472c2a9f8846cea78f86ac

      SHA256

      105799e8d89e1cdf2797d8b7446b6cf0ccc0540fa23aa52c5414f3352aee7cdc

      SHA512

      6b1204c5caa4f5502e0a499bde05ae1a265a0d1aca652b221e73792ac311e8bba8ebd8e1d4810598688c047548882befb22b0d7487c6d896279c53b37e32a7d8

    • C:\Users\Admin\AppData\Local\Temp\Cab9618.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar971A.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1684-495-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1684-492-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/1684-493-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1684-490-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/3036-480-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/3036-483-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/3036-482-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB