Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 06:47

General

  • Target

    74a4c72a5bd772b2aa152bc627273452_JaffaCakes118.html

  • Size

    334KB

  • MD5

    74a4c72a5bd772b2aa152bc627273452

  • SHA1

    5d5543ab7d1cdeca07d99526c113daf375fd8469

  • SHA256

    dbd0fe7a17f18004ea88bbc8f18b6cd12bdbf94d6ae684bccd9474e3726f53c5

  • SHA512

    cbda76ff45a4d3b76b3a866225f4dbfa41eba3a0dbf5be5c389f6ca713fc91938f511cf1a63e7b92998da9d67a39a7b6a15518825800c571734d4bc54f8a21c3

  • SSDEEP

    6144:S1sMYod+X3oI+YdsMYod+X3oI+Y9sMYod+X3oI+YQ:I5d+X3P5d+X335d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74a4c72a5bd772b2aa152bc627273452_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2436
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2760
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:1940
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:332
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2664
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:5911555 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2596
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:537604 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2460
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:6173699 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1896

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          dc6a3ffb298bbc948d12e47061d99bf6

          SHA1

          8b92681d21d3169f7971aaf55187deea1aedb613

          SHA256

          a696be7a7f44f51f27eb9c6024c4bf4fda8347b455d844c7d4b1375c8c8317b6

          SHA512

          404e516326d3cc24f845e705a1f99af23bfce5223510a355dd42dae6cc506c1f615394a89f76a9c2398f3dd731d8dcb67ef2042e3ba34d85fc058e871a0d4012

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          c851fd919bd9c4a400b500244fa06ae5

          SHA1

          7a2fdea3c4f5724fc87647049d6d4ff4d333bea2

          SHA256

          0626164617c9ff00104906214b313a716acc9eec61f0b4e1d2daec00cf00ee6f

          SHA512

          058f0de5fee5ea7d83029448cab22e6caff2ac8fd910adba19f963275362c19e8bfe7a841e7bc1608d8ecda9c6e63acf2a887484d703d9afb3f18654862274b4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          e57b391b8108e4b7cb2cad8333d27ff4

          SHA1

          33d8e8249244f4072cbeace48521b67b76c4695b

          SHA256

          f91586bd732fac071d28e458ca069d591faa5f556c479863cfc4e46d03701afe

          SHA512

          26c75ba94f361a3a5bda473990393a668850d9f1b116ab453a672666672b83259234bff18aa8914957d38158d3d5ac19e567b1305605d57da8dedf37f0168e3e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          c9aea72fd3fc9aceeb863cfb9c552784

          SHA1

          2e59b64ebf7b642ceebfc92bf315a939313a68be

          SHA256

          ad7895a7554a5a492cf382a40be8ca08e21c31cdbc3d493dbed1311802095cfa

          SHA512

          d7f006fa9bd0cac22c33b49aa068ead3f6897f37d257bb9a78dd00ff3aad298ad7f7fa89791864e63dd012e83483258cc38a23378cc3c6b81e1a6bd7bd9dcbd4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          e6f6909fbcbf617c7b47f9610c873514

          SHA1

          c2a6835b0b0b8a15d95f810dbcc6e0cd249ac4e0

          SHA256

          fd992b939a0c0148d7d83a63d59909d93383eccca64fe6f648f6453b8ce9b406

          SHA512

          2166e0cd1e0918933770b9263a159fc33c6031583ca546104bb98bb25452262a2847c7fa9ddbcb6237b4a557db4d0976fa598c36faafb0e76e5b581dfebca3da

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          f59d83dc21c80ed13d01b14cc1d94126

          SHA1

          a77e8af5583a5c298c2dd9dcb197f15618d10213

          SHA256

          f3a2cd45c5f4e160143875a0a7af0d2ebfc175a57d4f71f2199cd52688999592

          SHA512

          76cfbb073d4fad5d26962816ec9e08e90c389f7082e4533f22a6365e170bbc49d6013766fed9e76c700c1c60253cc16677dcd177a62a8f216e4572e425d6c1bb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          cdc3f3012fc55961d4f1ac04659f4385

          SHA1

          d1003b683aad2e5192d8b7b8f1598637f8c90eb5

          SHA256

          53315e4df3d268d7d2a999a480f581d641a4df7cba2359b1e93d971dfe13bfbf

          SHA512

          0ff0f2077b0a35c92d8291f7d5c9d4f29387feed46f731a06f3a612eb724d2688609ef6a0f7d6e52ab15252d5be95c3d50ad9ddce118a2a95684591a0c474658

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          d554a6e19f00ccc0d252f7f2cbf1bce7

          SHA1

          e3f94051bbf0e7efc15a0f1c23c31cc093383a6d

          SHA256

          5f23a3e83abee020d8e8e2d72e268f42bdbc66b8965ea3c90e893d17b740d54f

          SHA512

          05952b51a30e67aa48b4ffbc771570b058e20011c99b6ba1a4f3a4facea55615afa71c7ec0fac706e1df80e3268e1b1b70ac92e44d49f1bf74b6ab62907b48b8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          6a447393414ff169383ec17f1589beaa

          SHA1

          36f21c16760e017df2e0e5c0c4c0c84fd710e138

          SHA256

          82138c0c825c37f10f90ae91f5517f17af3de1478cdc907fc1b73b57db659c8e

          SHA512

          f93f9ade95a6029339100c89041c0a5a1c489c398269857e5fb7ea8fb04894ddc23bff068c48173db68cd13c02c3a47dbdf2db09e0cc4991101dcc8dc9091d6e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          4cc7bbe9a919065049fcfbb8cde912e1

          SHA1

          24ec5187f8a49c906b9c5c8099393e1afdc41057

          SHA256

          d371942a14b9653e47cb0a91c12ac83a3d682dad68efe90e17b3e66f6bd39d6e

          SHA512

          9e0f412ace4a306fb4d75332e1b95f1b7dd2e342599e9b09d9d97f79b392cae915acb969693cb936d5670e67808f06e5c0c72428845ad14319f22fc876e95be1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          ea14a14197cfb60cf96a71dfe80594a2

          SHA1

          8cf3a393ced2c92441f475d7088f12149794f8d4

          SHA256

          9e7b7f54bffca3acff5f33e99e195b46fd2fd73502dd4bdab7ae8a2ea974739f

          SHA512

          6ecc6ea2510728e8040faab6445facd6e0f67d50b0729df45f474761e796118b39b383828180522171e3ed23aa48522cc0eabd10196d3978f671596fbfb2996d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          6e06f8a2672fc06b6a38744592d79991

          SHA1

          bc917d2b87995c20e3caa348fc2c4ca1eabfc3f3

          SHA256

          e667667ead1d22b10f5d3e1cba93f4c94f42ef4c40b3dff4b825ba9c9bbed32a

          SHA512

          33ca63bf9203861e20db05893f49e7388cfe8c4e6a900288f7171bbb67cc1514e3713f1aff8e588c72adbffbcc48cefd1ec4f84dbe9efdea9f83aaf6b29b634a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          bc1fd1aa9a447b975811cedecb5aef6f

          SHA1

          f19f7cdfbf3ce4f613f5ab61bf27d484c9dbe082

          SHA256

          64987d1e31016051cbf031626f5700ae49fba5f56caa2785e5fca745c3acccd9

          SHA512

          e110b813e4540faff1c95e715d13de54ed31adca434dddcca74fba2806237f5d881c3ee951091f1ea77c3e138eb139c4e5944547273d67c35dede82f9d98b47b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          a847790a5839547dfd6ab8d7be112522

          SHA1

          7ab34e2e8f6692df308204eadac650987612ea6e

          SHA256

          d6863967be518ffe3b74c97a4f786ffd0b661eb9eac90c1fb971faaf007e4e86

          SHA512

          2c8ab956013cef2b2505fad5549042f51abbc393c1ccf356712cf30ce602166772fa96c1d9341a552ee67420e033b8c8fa74debdfca2001cdc7038eeff9afefe

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          ba8f940fdf5fa14a4a0c14ef25cb70e9

          SHA1

          2b7b26b9a7110560ca082aaabb318b6b160185e9

          SHA256

          ce00eb3f0a1d0325febeaad391f53488267497cb675fc1a66a6c990afeb4fc2a

          SHA512

          f4f0853833c57c4a8d8218daed541328c30bd3b857693ce4900ee74fbeb2c06fe4ce3a74b5aef4157dcf3d7e59e4af3cc1bf9da0e3795a41daf4de788f7e4b8d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          92bc915a78f1b13cf07eb5d25773e830

          SHA1

          5a845abf2e2129ef7cdfb5b86023fcf742e60dd3

          SHA256

          b69a7682763ca20db41f0662b702239454749d07ef6001d2962ee9e2e1a81de0

          SHA512

          0916794697d4103af8481b13060d70d1817d4d9569cb75f2d739fa11cd78102c992849de53a73ee2b16e30e3fa52f77a1664a3033bafb65c36964aafbc1a1c94

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          edd3f938bf809d7d0d43562ad626551e

          SHA1

          7652d4bf521d75abc5aa80dd226f83ce2e3be0e2

          SHA256

          6a3b58a12c674caaaff7fcebca485bfa9f1fe81076a51d8a8644e9d024cfdcad

          SHA512

          b76e7d2087b79c2911a380b56037bb0ded1df365c95e571df35b44512b59d508ead0d63b5d3c0ee491b41c91b022f2d39f9bef766d21d76f186cd2b7e4588b81

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          adc2ad401a86274d7e8470fb188033e6

          SHA1

          18c9f2753232ff789157c549cb2b33a1442a9da4

          SHA256

          641f5b22ef0b52142071f4109e8306c31dd1679055db1a14b187267f0c479327

          SHA512

          82f1a5d8bf3414dbf83174c3aebb92546da38a14d13edbf6f9a83a08fbd2c0e88f8d6a0d267bfe275a7c6ba383132b8b1721a28035bea20bd5b355ce3f769bd5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          d662cb642720520a0db95996eb48a187

          SHA1

          a102eabcea7fcc06113e8f059c6330f7e4fc5091

          SHA256

          18617b2fd6a903d96b85e96bb0ee500f7e4af51698cbe5765b36374f00010e1d

          SHA512

          60d18d4e6d1d355f2c16a71333fbe47c1b5ec98f3497d822422dfbe2d2b8c36e85c733cae8770bfa18c4ae2a8e2d6e8271b309344fdc2e6a66afe8729b33c4d0

        • C:\Users\Admin\AppData\Local\Temp\Cab3E7A.tmp
          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Cab3F47.tmp
          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar3F5B.tmp
          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          Filesize

          55KB

          MD5

          ff5e1f27193ce51eec318714ef038bef

          SHA1

          b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

          SHA256

          fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

          SHA512

          c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

        • memory/332-26-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/332-28-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2436-16-0x0000000000240000-0x0000000000241000-memory.dmp
          Filesize

          4KB

        • memory/2436-18-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2520-21-0x0000000000260000-0x0000000000261000-memory.dmp
          Filesize

          4KB

        • memory/2520-23-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2696-9-0x0000000000230000-0x000000000023F000-memory.dmp
          Filesize

          60KB

        • memory/2696-8-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB