Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 10:43

General

  • Target

    7537dc3fbd33359f0f356d5bc115aaa7_JaffaCakes118.html

  • Size

    347KB

  • MD5

    7537dc3fbd33359f0f356d5bc115aaa7

  • SHA1

    b895d2089e5502f16e14d74bd32d5c6d9f59b4cc

  • SHA256

    596cbb0c1c2155f231428d4957c0f7e43d32a6faae72d81836aa288933e2fabf

  • SHA512

    7533ce640298f5070b9b7154813bd4c51b79964a185b284eee8e1238b3d1e2816d96d820ef7b148f3aa012749459a03b47972a4333fb8e2fd3126b9fb419a368

  • SSDEEP

    6144:U7sMYod+X3oI+Y7sMYod+X3oI+Y5sMYod+X3oI+YQ:UP5d+X3N5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7537dc3fbd33359f0f356d5bc115aaa7_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2764
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2840
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2564
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2844
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:209931 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2624
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:4076548 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2720
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:5780485 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1052

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          9875fd58beddf3380b0a2be2c78250b5

          SHA1

          3c1dcffd69f4bedf89399680b54136fadf58a0fa

          SHA256

          89ef466cca31d05231eea3d393fe077d2706308347fac35c56043c0b5451a20d

          SHA512

          d64500bfeb3953e582523462c5e440399a2ce57ccf97e12f4f4d55af9a5d57b2506c47a1b6b7086558ecd875d63d148bda8934c8be228209704d22b0693e5dc8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          7a59ccf5b69e0c4bf5ef3e83ef77cb1a

          SHA1

          ad6d381580620f03d6e570442dc359afa3e743b3

          SHA256

          1333f3a92461fb7b01db3f6c307111a178b58860121d26a3b6df50db8b680c72

          SHA512

          74dd6c91980105c39e67249901a4ff3d757d87db7ab5965c4dfd5942cc2f4cfe74b74dfce6a0a5f1cfea282a94450333eb3582dc04b968ab2679420ecbbca761

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          9860052acf8590902fa6d991eeb5ec67

          SHA1

          bcdd46c2433e85f37a99e123053c7bf90c3f26e8

          SHA256

          0f461a8d65dbb4c26f9ce6d0d688c8c8ced873f55e60649432ede1659f6907d9

          SHA512

          2812a2e921de1f03aa4f9fb781ce24033bd5398c1ed50426dd87209abb866d26ecef68df75da88ac94e417223c7785632f64a7ec34003099af75cc59e5878995

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          6fa92a82fc10fe71f0f2b7ea60168c60

          SHA1

          d03ee5de7899613e65a256f824131eb2b5ac6897

          SHA256

          5a0b89290f3f0b4f6218e4a8ed9bb1f0af17ec118b636583fef218fbe40e09b9

          SHA512

          516b3aaf6e61dc3179f4f32047da0aeecd025535909847ec6af011ab26a6dc2de1069e8e69bc5ef054f372a18098c6f0a112b7f7ebac2f8e6418ca9e18715173

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          0124bd74a404524370ad97556669dff8

          SHA1

          09a632a09964c7f3af299b6d021e9ec8efdc9562

          SHA256

          06f2d803af383100e3c5fc2c9fa0e2a0926d45c3ca0f57cead9c6e44a73bfc91

          SHA512

          fb38b3c2278b087d85006d13e7faf943bc3ae34f52b8421649b451cee267bdba29a8d1c946195ad4888c0b9f79236469796bee0fed9b319e650b7ae3bda393b0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          04998db025bd70db3900e448bd5d8720

          SHA1

          ea9d5488833194a1d1ae9fbc3fca16f63707b9e1

          SHA256

          b61d218a38c66a3b9b4a28d25dc04b603836602ab7821b7d6bf139207430765f

          SHA512

          d4956eb8be46d2ac96641b5445751883d3ff10a6e87b1835291c379b880ed0bbdac400665ade330ea2195590b55615afe4134bed890ae83ba7d08d6f294ef21e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          c90cdce528ad143be0a3cf32d191cf73

          SHA1

          7d52b98a8a8aad080cdd8029cc96a5c07349f4d3

          SHA256

          56fb58d487563e1243cc430cf6c4f86e2f062ccad8a71a1e39c280ac8f64cbe1

          SHA512

          d7c26b60b64dea1956c4a61043aedb7549daf4263894a20ff06f74e1160ce6039c10d01a15b4c232826f56c0048f578f4cc6f0da3aeee0edec070abd0f21e068

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          a93acdb1f2a18ef531cb194ac9174798

          SHA1

          31eb5923181c8464217833c942605c5b8c998750

          SHA256

          4fbbd3667b052487ab2d7a5d28513d9cddcedf85aac467477d9601464b291b0b

          SHA512

          2e47cba0d6b3e43e2bb425fd32e61d52f1f827150419ce838df6f4c4a24a2bd239e737bc89795ab8631740d1ec467c6fe6dbb0c278fc8ae36442678edb8b0d1a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          4e8e0edca2a109c36d45467c95de96a4

          SHA1

          b4fecefce528f18c7a1d1873234bcc3350256b17

          SHA256

          ca5f04e81427dd8f510faf3a26cf20d5f54a81bc1efeed0abbb5ab7b3e449ee0

          SHA512

          f7ac39cf887ba5d56bbaa5d53b11aa17eaf504cabd2698b1c7bf9a2577ba67ff1f128f22cfd32d8b126668be37921ba82c5501dc453f0a3fa320a1e04facd8a1

        • C:\Users\Admin\AppData\Local\Temp\Cab1F36.tmp
          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar1F87.tmp
          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • memory/1992-29-0x00000000001D0000-0x00000000001D1000-memory.dmp
          Filesize

          4KB

        • memory/2632-26-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2632-24-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2632-22-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2636-8-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2636-9-0x0000000000230000-0x000000000023F000-memory.dmp
          Filesize

          60KB

        • memory/2764-19-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2764-15-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2764-17-0x0000000000240000-0x0000000000241000-memory.dmp
          Filesize

          4KB