Analysis

  • max time kernel
    145s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 05:37

General

  • Target

    747b411e6377b17961ca8005aba61b4f_JaffaCakes118.html

  • Size

    176KB

  • MD5

    747b411e6377b17961ca8005aba61b4f

  • SHA1

    7b6325361c9037e80bd409989150c7b6c15deb08

  • SHA256

    92b91f739e86575107eb02c98075facf2286689daa8de6178603c4bb37c340ff

  • SHA512

    2fbeda0bab1a1d808cc4b922c9538381f562d3905eb8cc700073d3e17ede7ce57b62ef4f386254824a14c9ddfcf1397401a82651516575a9b66a9c4cbc3be102

  • SSDEEP

    3072:SEAmxyfkMY+BES09JXAnyrZalI+Y0Buv07w1GkjkjzT:SEAm0sMYod+X3oI+Y0BuvuOGkgr

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\747b411e6377b17961ca8005aba61b4f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:896
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2728
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:209940 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2204

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d1935bc78707a3e342568e56a509908a

      SHA1

      7c3c88ae4277788a1d8e4110568a572f74cb290c

      SHA256

      ee4f142561a6b537611ee96c0d53262fe34ae97b149bdd56b021c63e795edc3b

      SHA512

      5e137db193f62f057d8fd4a1489494b0c1f0097c8f87873eb75a28826c768bc18dc512af028f15c921390038602d29a64d8a8d0ca8c4c238018dc7be589cd8a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1dc26838e6eb540607a1ea54796ecf31

      SHA1

      0e1070f89d9b51e80dbd9f75f9bc7425fb01a7f3

      SHA256

      2497518a3f499f42f7e1f9591a66b4f724adf657f19840c13ac39a120e4b1799

      SHA512

      7ac4733b0c97bd11f4004e9cb447bdfb061524223dc465cc9ac3830709baabfba877c72f7445309f35a14a2f19292d92fc5ac0044486b3e56386f1bd53abd645

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cdf007474069e0a80a744808736b7d64

      SHA1

      36ab2f79bdaeec8c91538dfd81483df0f1d23bdd

      SHA256

      51b7903e38cd0f300de7819916f04cd718712880a0987f9b36300b27399f157c

      SHA512

      a0a7fc48cda43d2acbb8ab75ed27cb449c937e784630f639f400d47eabfd900cfad582e04915e641ead0ab7a216e785a19d20a855d33bb75def95a587437ae73

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      09ed037abde339f7cbd4d80c10295621

      SHA1

      d4328df83212b97dcabc31ee071f24e2d2b0b4b6

      SHA256

      a6ec9e1ef0cc07cfb79ca81e0c6d0f9802989d54abbfc747d442880822caca65

      SHA512

      5ba4927ce6c4791a47d6ea0ffd1fc843cad68ec320e3bfc914828165d01afb33d70fd36a2db996959d67c12915913b3a067dd105b63a03c1b2ffbadcbe592f60

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      74b9b3de99ce2cac2a4ea1c27ce7120d

      SHA1

      2c8f66e26ae5255e1ec893540095830b5c591f40

      SHA256

      da0adeb9b9b69dcaed2e85092764452f65a6f4bf354d4ddfb7bfc1bc3221dbdd

      SHA512

      43f571e4389a4041fee5cff39ba70a067cb33ccc273cce4353d436df59ed5a9273f551939d2796fe101c24dc208ea0f5181399782e9006539f512ddf461e8863

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      26eef7b58cea2376207167e04ee2aa04

      SHA1

      c254da9a239f40a13e91f111adcbcc54444a77f8

      SHA256

      265d1895e6f02eacd16023fc6b5af831de53a7c777a346d2b8a2b1e35a9a611d

      SHA512

      85a608a513a8de25483df2bb5fa0dc26816d4397a8dc94662e713291be55bd3f7a0b4a5519aa925303698e8f27d172ede91af86bcd739e0340c0001053e2c7bd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      04ffe5297f42d28f32319757912bb44f

      SHA1

      b404590070c25ebf928cffcce6f82e3c884fe736

      SHA256

      ed6ca6f7bc24928853763cffc67027112201617bf39e471cc529fb3f952a7564

      SHA512

      e6bdb93d45b2958189cdf11efccee76a41aa990ea545b3129e574ae6e358b3e58354020aff3861d4abc9628428eb0116221c878065d20cc21ea2bcf834ff32c0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d1b5465609e70d43df966962652a20d5

      SHA1

      cee9a4da1d3c6a604cc4ce55af709c880cd53bdc

      SHA256

      c795591c9dab0db740b3d9b53fcd9daba753d2b91bed50f6ef0964fb9d35ba28

      SHA512

      5f03a494e6ea5373f54b35cd69611027ce6e93e467b1b6c248428fe96b9ca850fbd4e916a6d5c520cbf000ec5a22178bed6009646831e9e7cec507d41ccb05d5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      214eadc718af19dafb0c8f6597797356

      SHA1

      5dbf1527add73dce7c4c86fe7e99c54f79b07803

      SHA256

      81adea8fe7d56adf9ad1b3d5109849b17895153f83c0e1047fa2d5a35447489c

      SHA512

      2ee61a7fcd6e55674fa93067efe68fe3a75b24f5ebb894fa7ebbd2ba64053df77319e64f7147668cbe0a861e5ed5dafd6013ba2ba125060f98ee3afdce378360

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      92cd9e246c4db5b47db1d03fe5448ed7

      SHA1

      8a6aa54ffc8abef1ba7f6a8f587318e0c06b0bac

      SHA256

      5fa5e229b1b979be3488a2487c03bb15fe9a95a9a51e5cf995f2801de573551e

      SHA512

      5e27c4eb88845870e396b6bec50878371c360bb22658d7df18ff83fcf7f9bbaaf94a1381d1bcdcf644c5b191de3461956cd10cc65b5639b001689289ff2897da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3a6c8102271d348456286fc380d0c3a7

      SHA1

      ddd91d5d7b5d1286680fe77ef8624d057019cf09

      SHA256

      52322595af755b4f15d009fae081ede33aee226a1f5a64a4669df56d02cf54f1

      SHA512

      b550f4d7c8d42e5dbc56a6d23f8f4ac3d91bfde6f19d52cdc651aebb8fc560ae3b38976d5736c03fb430b2efa436957a35274d9c0b9d063460c465863de3a258

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      06a4cf7d89dd239fcd65f159c9cfae49

      SHA1

      419daddd8a2be058228d1ec12246af28137d6e6f

      SHA256

      eea4d220870d8d3f78510079b03482b5080d00c735e6a2a49b1efcdfcda6cd46

      SHA512

      56e58a732956225fa135309945141be1453eece1ca8f713a32f34acb049d2394e0c5d1c3746a5ade03598f0e2018d97639f9b442d29ef74706da1f1a2eea643b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      adc45af171ee5db3c87c41aa650df4eb

      SHA1

      ce45c4f7590e5de83911485839621cf6daa3eda0

      SHA256

      0db01b03244477566ea77db31ffc9b2bdc3fc81d5be93ecf7b2e96da07d9e803

      SHA512

      f3109bd1c63e45b5ce7ad05af2d30532d6823b6fcf665d790157b2e6cb12a1716d5d6841a72495dc0d309ba39fde2d42e5496a5902b69bec3171db324623e0e6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4955610cb84b1a80623fab129bce60b0

      SHA1

      7c6ed226ec8e33f56758a7ab92c19c052d0b40a0

      SHA256

      62c947714a8af3e509e209f064ccd123f664e0cd8c6baa6868a30b09dbe6fb9e

      SHA512

      69a621f9904c9b4b7b3079b1a9742e5e5c90370944199987388bf1b9c306cfadaa3a7bf157979e197edde73e2c535ffde7d647c8a25d65317e588f52afc9441d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d5e75e7a1cf2d1271c4681d3806203e7

      SHA1

      afa10da6fbe1bc119e07754aafbbfce6434b0545

      SHA256

      b9f904d792c49cf92701e38c2927429f052b65403ae3f581e5bf53e48c88e05e

      SHA512

      2d8938ed6413c35f7da3fdbcdc1d838e449c14ea415912c6dc77a06524707245c1867c8313e6bc1957d62de51a283a3dd3bc079f38a6925a7f8120a131fa3f89

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f5cb19c1260aa50665462c423a3cd3d4

      SHA1

      08c7b43efe6a58c151c57446038920e4d952177b

      SHA256

      460dc5cb2610053aa57a731b2f67d8940b9399cc627fc24e9ab5cac7ec5f82a3

      SHA512

      ae004095a7ab02f98924dc207e008fddd778d9c0aff439942214eb2804666b001975fae113f4fa44bb0fc2dda3994b5df2c5b9e8b963c3f8ca5abfa42fc41887

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a4d7b3b31aec25e19446cb6269e5486e

      SHA1

      4e9da65bb2681ee73149cd669e919fd7d8f5b4d7

      SHA256

      18410c144d45bbed351c97afcfb3705458e7898f5de90caf050eed6da0da431a

      SHA512

      df9a5fdb4c28e6d4adae79783747956c5e30bcb51115993a05e1439afe5230a8791897f8b3750b3ea9330e0f18547e8e0e17c2ab0904d5e66f07df511c5865a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e7fa70be340888c268e546ca17e58a4c

      SHA1

      d47df5bbaae4a5cb9a854fec06086a4f000e9870

      SHA256

      39582fb96b1a55393c32ce4e4c6f9e30896a54e9c3ffc1c8315d6ca2bba5af0c

      SHA512

      9c825df44a53f81cf298a155967ccedf29aa51a0d5f7f7637b2d5dca3f117a735526f309a0de8c2fa3091d5abb6ff1eee7784e4e8e43005567ac7ea9ebb5000b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e009053192a9fc1f153da8c924584504

      SHA1

      8dedd037abde76486385fe0d443d413a04fc414c

      SHA256

      2e3520ebc665e056b86fdd3aea2f11bdadb1a1f0e117443e1e830491039a46e2

      SHA512

      ef9b9db20191a02eda71307c20e0e1a83e69dd6551e1b6453b9d8661a210629f63f0c7e98fe8848a2bf5ea26b6171f2eb910760389aa2cd1696224cd47717af7

    • C:\Users\Admin\AppData\Local\Temp\CabA10.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarAF2.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      83KB

      MD5

      2a591a91440acc2cfabfd0221cfe1378

      SHA1

      add23a4e51dc5649984f56c235c48382f5c4f235

      SHA256

      2f37132fabb06650873ad3bd0b15d2c13596fc7be401c0ca05b443c9a227a44c

      SHA512

      3018caf86d187c14256deb92407157daf116720623c9ecd7d153c8456d4d1f9ec9b7a88db6db9a02f06367301af5d6c3d30e62f8ad04657fd651d4221a9287ac

    • memory/896-497-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/896-493-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/896-495-0x0000000000250000-0x0000000000251000-memory.dmp
      Filesize

      4KB

    • memory/1952-486-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/1952-485-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB