Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 03:25

General

  • Target

    74301bae3f72a82f06e8e076a2da2bc8_JaffaCakes118.html

  • Size

    184KB

  • MD5

    74301bae3f72a82f06e8e076a2da2bc8

  • SHA1

    f127ad3a88216498cb557b3d95a7e172cda96d87

  • SHA256

    10a14f54bff58693a1290d81809e4c1eb6ea7bcfe1e95244570c287bf3c35687

  • SHA512

    e402dbb607af16ae2c04a7e157ef024f31b32c812ce9f1e7563a6c679e2c9467f2696518e218baebb6476a7c242c51f80886b3314415cc57098b958470de80c5

  • SSDEEP

    3072:I0yfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFis:isMYod+X3oI+Yn86/U9jFis

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74301bae3f72a82f06e8e076a2da2bc8_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2552
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275467 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2528

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
      Filesize

      83KB

      MD5

      c5c99988728c550282ae76270b649ea1

      SHA1

      113e8ff0910f393a41d5e63d43ec3653984c63d6

      SHA256

      d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

      SHA512

      66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      34d05ca3473192a7217c0d6fa862592c

      SHA1

      b722af30863926e0f5c63c638a8ab22cf324bcc3

      SHA256

      690815d527b4938c31902c9f34b06777134f3bc7af2e6b8270c6b469757f2af4

      SHA512

      bcc92bfe642327ba0dc1d0c7811e24c558707434690f54c1411525cf3cd08d786789d28b74923a53794e26e8b018e6b83f389c0ee40317a635bb8b4dec86a472

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9ba0f93fa3bc256b8a028a87e5488ae0

      SHA1

      41c8fdf130b5f956feee0513696332fd08a7ee3a

      SHA256

      4570a5ed525d3074a9e19d0a8c679874bfbd8c7cbe67864b2d749fa822e6b4b4

      SHA512

      c2774cf1303fc5f38129ac3dc4c942dad225c91bcc0db58ee92158e8f70798c07b42310ec73ec0d5cc9848c433321ab20c61793f396350cf2be7ac1e6521e1ba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      738091342d5d19ed5af3621487f892d3

      SHA1

      7557414e0bd7dc7090bdec882af37dc30f381e95

      SHA256

      17ddc40401075b69ef351974ee6031699a23efbc65e06291f624547b33eb0d40

      SHA512

      b750b0b4914ee2b5077bbabf066742ec203d8bfa71637a47488387255e6f319262b933e8f41c7df3b86e091990ab04c860072c702e83d9fca2d3657502d9c983

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ba5db2ce18a1b5102ab50ac734d25a85

      SHA1

      6cbfd76c6c63c3c2dd742c7e38ae9cbfba8a9243

      SHA256

      6433b684cceb8af3f9d25ac656971f9e18c644199cc7f50b7fa8e181d5f16e54

      SHA512

      1ac264cbd86d6adbbeff97a4fc091431d4aa6fe1df372e78fc3f04e4d95c0959c6811ab71d036bbf98e5bdba8e03a73a297ba837f733ade05bbba4f95588e156

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c321ebe480961b8b9c96c150cfd18ade

      SHA1

      4d3f577612019d5a6eb691e25c5dae233a1023e2

      SHA256

      6d4a0cb27768645cb6e0b5f3718932ba3bf3a298f823d3e1db7e7144ca023b47

      SHA512

      6ebf08f8a8ec27214db46420d3034c7fbe565baaa571cd5864d338063703ad9eb1299215bf04671e87bf42ae4484d77d28c6f8fb540d9da4232753a19abb2b5c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      14c1f20aaa0b22fc626cdf7cafe7e654

      SHA1

      68f65344a711cd35250816f42829dd990246e35d

      SHA256

      83523f59358d4a00343913e4bef4515b3e534147d604c6dde5a16e89c526a9f4

      SHA512

      1a0d1ad0f8a8589ef70768521cb6b0aa90e6a2cd1ce8af401b8836caf79302776030799567220c7ab5cdd2393cc8c31f9db413264027c3228e0d9a14f81f160a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6fd77241503fb085ce3c2af560304912

      SHA1

      4040eba064e45008b522b5cb2f7d3c715fd855d4

      SHA256

      51e0ffd87de8cbad5ded83544407030d8577f5bf3ffd558a6d28b0decefe97be

      SHA512

      e745dcc5337d47e46a9a75f0e15d9cb4485c482dd834278059da9af2eaffb940855c304d133e6925dc4893e578db8e3c95a83b7d572116c14b0cdd860aeb375f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ef8411b5c999abb9d3e19bf219c0b336

      SHA1

      ac758bd5859bb133d9cde9c4fdfb989af3687c6a

      SHA256

      157c6ab6df6c25faf643eb01a88455144c26a31d4537c5dab8ac356bafc201e1

      SHA512

      741d76b3e247dedcdb956f11518b425cc9779493bf9efc00f0fa304c6f9edd95c37c16b3f3528873274ae0509891e7fe85e86887bdb98476aa74c2e353a4df78

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8136581b6f9c6feb06f36879dc754f24

      SHA1

      c605397d730ef96e836def9b2678a0947c4ef683

      SHA256

      0237a4ebad880cd9c7c70589e3bf8ef76ff0dc1d80eb00f47f03f65d159fe08d

      SHA512

      322c837ec5a2f77f003b304bd8be6012e0dc28ed6b3813864a9f8d6127b05cb86f90956f2042f7465a5eb23ea683f1a8014520925b62a153b7353ddcec550b3f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      161185170380039e281e8e806f701cf3

      SHA1

      dce122cc976fe17138d0bff1ab94aec21396295f

      SHA256

      764138840eda0f81adb807023eadc575a2034809041f3623e44c608b62903fcb

      SHA512

      f536de70dd090b086d9590ea048e221453da4b3e8a5dd4f93282f3cb5abdeebca7b0ddee755943841fc9d16f479ad29228716f1087265bb406173ed55cd36978

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b0a52379fc008ff0952f63b1b5cd03b1

      SHA1

      fc7260c0c1121f43ef298d4eb6726231e7a4ee92

      SHA256

      90325beb87fef2adc5f556d35c55dc43b48677f8c9b9dfdd43f231a518739dd3

      SHA512

      a473f3ad7d44f38c74502bca1941e77d00343e62d205f5ab4a23fbfd90db7a1d43e6b17454417fc59f47a0c237ef3c19685a2afdccc9c7ba5ceaa01e5655d183

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b486cd4e11a6fd9cdb8e79b6a641fbad

      SHA1

      8d4587b9a5e7b22116f763eeaee06754c6585067

      SHA256

      aa2e0fed3858dc518289d5a516f722fb46e4d740e1c0c46ff01f1c8bc674d442

      SHA512

      1c1dedb7c7ba98dcce3efa98d3d2a3c5f1ffefa53a6ba4b219679452b7663f547abe0df6b627fe79f080b6a3c680ab733245e8632b7ec8021736235d924ef50b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      41aa4f24a44a7e2a702e3ddcceedeca7

      SHA1

      a23ee8c540a3d01175d9b8fdff708a0156be45bd

      SHA256

      1da914733e8b82fd1f3471e512421e7bc7d9af5df44e9402189a7746db1c3507

      SHA512

      356b76f6cec9cd5a13c0ec9e88f41212ddedb91f14c0307eb97eb2737213a368fa895b49007e7899b007f16afffaf6c02ce89405239c5e2c808c7b544855685f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5f33eabec3babbd7ce912f2377bb5844

      SHA1

      edf03329e3bb55e76488ae138d0569acfe2cde76

      SHA256

      c3be122a77723889200bbdd10076b5b3d78532951b069e908211809531a748b1

      SHA512

      18f7747efefd137864a20add922e39ec6c2248e7797f963b114628b069c72dbb981e5e8faa2d81943db3ccb1eabc5a1b50fa7621c5c960fa273250c8721a0754

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      16144736d83b305854cb819d2f416906

      SHA1

      857f0ae803da54f98c4573776342ce2fbb8f6910

      SHA256

      db12b674bbd0ce05cfa36efcbccabcb90a2e8a6d9d3308e43f905033ff757afa

      SHA512

      0964544c365e34a1eeca0e48d5fc4090e53516a6e3ade71e21bfd03431f8638fb067f79c46cd47c86d3964a6b2238e31922a8dfca8430de367f3e179fe124f37

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      70e94a6f3481177cbb4de88b6460ceaf

      SHA1

      4554b27ddbae0d8af6028a0ddc85e34e632d3217

      SHA256

      88f638bc697c7c6bcc41607a7167c60f224f6033191554fbfbb2826893ff5af0

      SHA512

      3b76583c59e6f7833a8a9f000f464b3cbfbd74dd1c70cac00b10f030a2d5d84dcd1e55859027fbbc25bc23607f9df13b5fe02a0d4a2352a1c57476e81f0ba9a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c55c14fba52d94a22bf70f3b976f8202

      SHA1

      22c8d472ed9c75470b72d6931364de9393bceba3

      SHA256

      fb2d521356bd35cb096371d00d64878fa4368b8bb7ac545e006600208afbd25b

      SHA512

      ffe326f79a22fab47ae615bedb4fd6f1bc802aa5b99eaeb98ee04d8c63cd004b5739a0a3d21e6972aff95efdb3043ad2f2ae5b80145ba5e7abbf68590b910f6e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5144d07bf1c35a962bd809de328f592e

      SHA1

      67c9e3f59411bd7fdfa13a357011cf6d0afc9095

      SHA256

      db1c0a39a9f5eea3dd27d6676bfbfedf7ae761a6d73e4b933b006fe911b5c033

      SHA512

      83fcf7236b9be36c7a3a67fe3e5772ed659af5ed8522339db19c8884da1298e341c7f6026a1602db1cfc284eb6d93f7c4076d594579e982be5fa1c13ea0722de

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      68606f93db302f38806df9d7a199e0a8

      SHA1

      158cce12e75496a51912b2321093ddd3998b263c

      SHA256

      8cb3ff48f5daaaa9d6446a73d305f579642cd8b63f8ac279fa5eb7736d120cac

      SHA512

      fee143abe063f22316fac7569d3fbc93eb63e6a09058bb0aced3bc06e70e69c3b9fb2c1345c6ca066656bb0299fa008b4516d0e939ae8e9901dfe15f815082db

    • C:\Users\Admin\AppData\Local\Temp\Cab3027.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar3098.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • memory/2504-9-0x0000000000250000-0x000000000025F000-memory.dmp
      Filesize

      60KB

    • memory/2504-6-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2504-11-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2772-16-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2772-19-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/2772-20-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/2772-18-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB