Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 05:07

General

  • Target

    746964e7f502620850990e1a31e30af4_JaffaCakes118.html

  • Size

    120KB

  • MD5

    746964e7f502620850990e1a31e30af4

  • SHA1

    da9e070bf2345341cb6584980a7be3767e6d9b43

  • SHA256

    4376818852a9484719758657b8a60fd9a9624a87ca4adc3c14c920e8016879bc

  • SHA512

    c969d7af04bc24a5e7b43990847ad303883eda94c6791184e36d0ec1fb58818f74f124788b11451970470a784b02f1d9038beb3d4c23d0a8e808a34f81399201

  • SSDEEP

    1536:B3xmAiqBiPyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:BzMyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\746964e7f502620850990e1a31e30af4_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1900
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2696
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2600
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275466 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2436

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      252B

      MD5

      9bb620a59dfd8c888eb00075c4f1f5eb

      SHA1

      549a5e83965ef3bc45f9169df7280ac5fd193899

      SHA256

      0e89e2ad5bac16343313d458eb3d30b24bf84571e074da81a1d1c3f5763e6eff

      SHA512

      b770d86d6d61fdc95b5b51edc65429fa5db3a1c7e725b7525b27f61a41d1679655d70cab6530a517e0f2740cab80a35e0dacab7ef07b29aca963cd8a42384fd9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3a403a121f8f51cc69a0864ba103a320

      SHA1

      3f344c46793a49bda6b29c013f64f20e6e05d468

      SHA256

      1786fa7bbc3d2f41e5e1852814b3e7c3884ce78341adf3267fd9b2548bde3009

      SHA512

      c99c75729fd78e06801926a6b957025f48e717ed096edf12510e95f0822745fc6128bbf7e5f8cdddeabba6214b5ff89df9625ee9fbdc4b884a627f9381b4d52c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      19ebaadf076adf9e13804b5de3085be1

      SHA1

      0c22bcd10207a4fa8e0e2d8eb0ae5fa89754df46

      SHA256

      22b22b8d2770aaca8e6a9aa7dce015166004cb9df8eca7bc2b2eb3acc60e63c1

      SHA512

      a5fef7ae99ad70270c669eb929d768271e1afb17a7aada7b4ecbae174380ef12afbb1ad67cbb3bd49b09b08ead50706522e9459377699fcfad4dd3656e3d4baa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      430811d5a009d860967e7d2319e33fc0

      SHA1

      0bdaa2d0db560e8b6e5cc4a9516a8f32cb37c8a3

      SHA256

      62930d4aeda20652758e2e3e762a7ddf030181def037fecb69000ce0e6702f37

      SHA512

      608a2b58482c80ac510e0cf5904bd64ab5d6f0a9349db73bb519da6537056625f6519537d80337399be22bf6d9d6ff4ba1b117e5850a8c6bd347c6249914c4b6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      153487ce8127f4bbe2e3c71d1ba58cc9

      SHA1

      a3690f6e3aed0d82371ef418c234e8fde8dce5e2

      SHA256

      559262f481245d096d7feb90e3cd1c0fb567b017f95bea6af86a87401b3af5a3

      SHA512

      7e33d81842e5231345104f446306c83b37af4863a978b608f0abc62ae04c0ff9ef9ee5bce49bbd2fda544898383c38edaef7195616798a963fa2c05e5e9827ce

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3302a6cf3c845cabe5ef9b970922a537

      SHA1

      9abc056aed601ea3ecafb7840a12a767f8f1baa8

      SHA256

      c518117bf4a0262e2dde8aa8b1811bfa1aa0a066a97557bf1afe5a1371392d89

      SHA512

      5b7af2e99526fe2cf374d47e1b8cc948c8d6f73a964778c0ebd32c9a92c2674c7e8a9ba7149166df960919faee83cb9072dc39a005d1ecb28cafd28ed6a16cf7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8cbef1e99a0a72189aba6422c5cf3308

      SHA1

      e9c6ddad4351e1a4e4b337640b74c5162f924c23

      SHA256

      a9f067eb40d59634d006f054b6dd8100579d146ea5d368417655493182c30bce

      SHA512

      4fd30f9221aca6706f5636d3704b61f11460eec4a49093ea08f817728a7b789fbc43dcc2fb74e130352c6a540e4feaba94f7370bc3e0f618f884142cd4bbe113

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3557f2a23e5e99292ef8bdfc3106ef8a

      SHA1

      cf6fb226b2dad002ed9c724084f56a8b183713c6

      SHA256

      a02a229cdc1c9c32a35d73c65e9310e5e5658b5322e036bf2730640a0358e04e

      SHA512

      c7d725b3c6305dc1aa6e68c47ccf86b892cf77bea16af15c4b47ed95ac9e03a92583d11505b7c99ecf12bf9349db48c9a12bfa557dae9762ccc6a6a21fb054a8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ec559b9d5c0a7476c2d37643624dcc78

      SHA1

      91f22741148b38c28814da2e58561db2f04cc3ff

      SHA256

      d555994edb565cdfa293d9c58d7766fb48eefed3cd3640f91b02bcc6918b9629

      SHA512

      5087a8d5a48aa54b1f29b0da994a3e655bf433d60d02a93b2bad59b3f7221f065e21aaa560d90f8abacfaa79f26f1419af630ad87f13d84b3c87000acdccbd7b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e6874bb7931dfbe22e8c07a7c698aaab

      SHA1

      504a2ab6093693dad08cd810f0cc176cd4ae3554

      SHA256

      4831a2a52406eaf090304077773ed4dd8025f50bddbefe106a2180b10f5796c2

      SHA512

      7911f360a551c37e7051d1ca992f06e0301d3a4e042ef68828f1b3a9d25f199d94c9e64d4f61f8880727bc7c5dbf7b5df49ee634f14e4bf847b3ef301c84e1c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5178bb514b065777fb90dc565e1cef4a

      SHA1

      e9571f6af068cef594da756490955bde7f802f78

      SHA256

      6b70265ed6573c62ba97c1a3c19f731fe65fc6c5ac496beacca5b6a8bd0002fd

      SHA512

      41653d84daf0bcadf58c2d8c1db58d11da25485f775c63e67b93d7458deee0dc5f93d1c7251fdae4bda1b7961466e11b90e839a537e8b34d15e97fab5adec0bb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      bf8155464ee8ad3a6bc62f5ddddb3014

      SHA1

      9cd9c8dbc22ceaf7fe4cab6fd718aa2df4720205

      SHA256

      63636a4e3fa580e9e71e272423ca2ad6a05a233ded53eeee7e23c8a14bfcb77c

      SHA512

      70da48005280a45585b1713dc893f64a390b8866cebd59edb4210a5f14b5e0ff932b04341d5fa9cb21780699e3d2061126ce4988ef2139e2e70de1f211d624f1

    • C:\Users\Admin\AppData\Local\Temp\Cab903E.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar9060.tmp
      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\Tar920C.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1900-6-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1900-8-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/1900-9-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2696-17-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/2696-18-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2696-19-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB