Analysis

  • max time kernel
    119s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 07:47

General

  • Target

    74c9179c2305dc6cb55585f898b5b118_JaffaCakes118.html

  • Size

    137KB

  • MD5

    74c9179c2305dc6cb55585f898b5b118

  • SHA1

    86d9dfe6bd394a14da746681c59d4ab8093d3e0a

  • SHA256

    f7b89978b8bb1f281e9046e03c9da78e4a2b6addd215b5e10ca8deb0aa96b5fc

  • SHA512

    df6a68fa93c22147cbd0783d501fe417d6be72eefcf0d681821685d85cdb191793b365c13358ecf64198df8efc4cbb4073ed3b89b7a6fa966140532ddc6edeff

  • SSDEEP

    1536:S9ijzfi9yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:SAcyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74c9179c2305dc6cb55585f898b5b118_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2884
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2460
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:406535 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2420

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      dedf39e139a40c8d55c2235999ec3fc8

      SHA1

      9a657c7217f123ca8ee56a2d5bab5504d6e6480a

      SHA256

      36482865f52ff78923b99726ffdea38df99e17faec36cc3aba9a0623c671db19

      SHA512

      c374fab7ed3e5956049c2108ed46df3a9423c399502a58cf38323d465118748e158f40d502883048e31dd889fd6a8d9e99783df8a28d1680056390faecfc3b2b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      383eda5879862015a22897623247d294

      SHA1

      6e0fe5f47e1be6ca68ac50c3a9d8fa8bd0a86589

      SHA256

      621ecb92e13078a1dbc359bda6b905b79d5a7b0c310c32b95b6abb02363f0bce

      SHA512

      26c3ef132c1cc772ff7000ce21eb8ee84c3c65ca847a73f165d513a55f80282a93e6735a84a546abc6c3b59f2688478a1efcb89f67599ae9e7629d35369837a3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8aed6ac4955aef0223be7bf10a689012

      SHA1

      1868b20cb1545d41a9c2f9c67b76afff1329b002

      SHA256

      0e2feae279eca25513a662a48ec5ac07444f0201d2765953e1e9f0ddd617cd7c

      SHA512

      affa1590becc15c8e8130a1ab5ec5798fc7b8c6948397de4ffc27248992d550bd440962da83e2a8631b28273969b70befa268e7a35c41620a0b3a82ee24c98fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      01e023636588e5c418044e66418133a9

      SHA1

      b9ccd29bdb4ea557a755f908f61c98fd3d7aa8c1

      SHA256

      d830c47925320f78b9997b1cfbdf60902c986cc2c3f86f14a1d05ac3dadee843

      SHA512

      dafeb4f3de57e75b43eab2a71fba8bbf4e6b28ab363084ab55e3aaf8ffbe0d401277987210ff350d03b948953274239216e54973fdac3a80266941fef89f67d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      012c179fb2c168796833be40c92be3f1

      SHA1

      b8b7d38b18fc35a9853112660793f0e6faaa4b56

      SHA256

      ec497cb57e17bd96daaa78573e917d36d55d248aa0028e8e1e2b099005debf81

      SHA512

      9145f8154aabe54d8cb875f12d586d99e5a793320e447edb1d59527c2d3998912a73ba24d0e3a907b799036197d71a8af1fc972b83693e37008abf486df28343

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ed005320bcce1e83f8f5919fcad973bf

      SHA1

      c1060d442727d9ae1efe6f7fb6df9d8fbf27156a

      SHA256

      9c6ed4083fb93d77e0927ae97db2ad667f68cbbbcb77d05e2effe02cc9978895

      SHA512

      b386ad4a93e24eb1c3961cc81710ea54d67fae99b5057e07abbde22237ed0f4ce36b91191002d9bf2af8f818c1fb3cc1abc216ac6bef186c7920e0145c979114

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      34f943cc5d25e94b18b77eedc900beff

      SHA1

      79c2482eca61a237b25899ef2656188a3966ed09

      SHA256

      812831de77e3ca8d362f81044e4a262945da78585745043a93918d01a1b8a326

      SHA512

      fb3d04eb637020515e7c0803c4b987a0f5b6962cdc2c096cf3142aa70ff23517869d7c46fe69aa2795c776db9d9acecd64f90bd15497b7ae39a711767432f1bd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      7a02ad08c0e26e9062f5e103dd2f9d0a

      SHA1

      b57942db19af9a882b6f5940c4622ec305262d52

      SHA256

      9bf25f2de5a131681cf77719390b0a6d953e3f98e6e37be72957dabba2e24fb7

      SHA512

      bc21e53abebca5dad781279106c8dc51b42a381ac1134062c2332a32d0409454e16aa5e23dee85e5bbbb0448374ad713780d32c00e325cbab46ec899446ecad0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e90af2aba44c1ab8cd44b96685aaf206

      SHA1

      5db22583f703aa5952efbfba119c46a73133c7f2

      SHA256

      a68d0747a5bd62dcc3e1411ab23e0c3ef51c3942de4db4406bed59f42d7d73c2

      SHA512

      4bbb99927889eb693e6d166bb5397ace97b0fc2a0407cb6640079c90d6536ef916903382ff71ebb8f42e58177d1d5c579502753af39a37683cfa3d2a132e0573

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4b5a6640b0149fa4155d5ecafc92e98c

      SHA1

      3aa361d58b17aab0874543ad7b1b402026f0ad07

      SHA256

      4920267d7beab762f9668e69b2fa137f2fa827057646bc503f89677a42aa7289

      SHA512

      36da5e4f7a53e7475c917636863b48348b5bdc22bd84990556152f1b07af5b4747506e23cb2283afd8540f49cc51bba74bf3df888cc13102c2a610705c1b794c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      009d7e6f77dbe95a898a106d6fc0cdba

      SHA1

      e67833744d07e93e2333644e5d58ee3f7a8f9b69

      SHA256

      3f5ed52414fe35bd16ba7a8cca9192328090cce3eff1fb04cbc6724e6621174c

      SHA512

      2330dee15b3b52fdc3aae3cc57d4b49dfe90559fa573fb2781c5f286274d86dc7bd6f6a8fb98f819408129a1dba176b2e13c0d4c1a4a4cfed2843f522694a09c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8575c47dc9cbb27f91065c2cee805f55

      SHA1

      dcc6a11e2876d6fc2bccce87079115bc5dc0e2f8

      SHA256

      68807c382ecd6483d8eb1c85e74d52864e7027a62d076465f634bd829ded1178

      SHA512

      45dac15dfb15f7eb0a82135060f37e45aa8dac45f68df0e14b84c751779885820a1836731d9c8096e9bf7197d29ee3b1c350e617f948361c2c2ded817c1be895

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f48d500e45df330f8dfcfd3ccc788edf

      SHA1

      3a8b56e56b06f6b86f50e59d7d85cab831b7a60c

      SHA256

      7e3885da85bbbc6e40a8529c66d64ed3e740db3bc806f6594fd618ee22fd9b45

      SHA512

      05a46b2a9f31d102c592cd4e86f227376a906e45522257fd5d13735dceaca71ed3699525b0eedc69b255b7b3c833f1349f2cf03513c8ad03f93e586ad005886e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c505d8f8c79cf9cc3d159c597293a51a

      SHA1

      7852fad4cb0ce8d566c044173d8d2e8044d321af

      SHA256

      847b0a2ad82f832c8e1d2d903f96664ed546ee55f4eae3f74990e43df344e343

      SHA512

      2ae03a74316761e50f171e63e21b66007337dfbf194997d2478ad12c1898763f20a01bdabca8eb6a00c06b69e0a9b7ba99152caaa3c9e937b4cda82c63499252

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      568b68285b734b008472310ed3d7e282

      SHA1

      c4bdd37dc4c7de815b4543cde7195a06cf3ec6d6

      SHA256

      4f27ed4049d8b6e8b1917c36c6d8353beb0c40baa98fcc34c44aa0620d163d9d

      SHA512

      29d524a1ee720516a8de90aefc4399ef56ffaf7b7d86a65d49877684f6a246ec7ae965eb723311ebe7c1766492b46e34054dd36738c67963bcc311f860f4c01c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      df469e3c331838670184572f3d2875be

      SHA1

      878ec06460dbb067ac7bcd676df5dd208664dce8

      SHA256

      1cbc74bd0f761d3518cda9a6c3b9726def90d5c384d760590983e67225b4d9f8

      SHA512

      fdc0388156d17dfdbdc9cee2a6b2b5011b86e7564d31dee9679eac320a5b841666431681cf709c0f9e1788605036bd48ce7fbdd73ed40aeef288c2d1bd078d97

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      dcc01e2e57c78ebb1ed678af74c0fec5

      SHA1

      3c4501d412d81cc73186f831f6ffde6b8fe59482

      SHA256

      0fa4fdf6d4d94761d7d94e5d6618609f1bccf34e6e92f405a16b75648c58f595

      SHA512

      e61177439cdbd5014c8fdf3b684cd832267b8a110e47958b961bdea7dbf3cb11377ab191c31debe7805650c3aec06cc6f68d2a02993014464d2908359e5257fa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      05e9aab9e0f352ddc50be01aed72e0f7

      SHA1

      b189c7258fc3cf242c6757aaa44816673c2c55f7

      SHA256

      6e9331394ad5b573e9a9d7b50c71ebd4c1b2b0732815d7fb276ecdb019def0ca

      SHA512

      be95a0ca8501ca6cf8e098cc661a2cfa27179af193a2c7776d63a17e7ae7ba8cc83ac946f4316eb29cc3bdee8d940ef20b170c73213c892321f7309fd8ad0827

    • C:\Users\Admin\AppData\Local\Temp\CabADFD.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarAEFF.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2520-6-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2520-15-0x0000000000240000-0x000000000026E000-memory.dmp
      Filesize

      184KB

    • memory/2520-8-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2520-9-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2884-17-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2884-22-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2884-21-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2884-20-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2884-19-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB