Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 12:10

General

  • Target

    756f08a8364e040633fd834c514c73f1_JaffaCakes118.html

  • Size

    157KB

  • MD5

    756f08a8364e040633fd834c514c73f1

  • SHA1

    ec38927b8bb74fbfac215c0f985ec3253025cd4d

  • SHA256

    69b9cf892861c017e5b658ebb7f70f19d0b45117791e62106ba702a4058bf47c

  • SHA512

    f6ee65f38626a98e9d89b4b2554c5446fad8b52c5de76544cd5d5462797dcc910d033686297767078e9ca440201fbd61d2b6d61cf460bb81cc71a3a9c193fcea

  • SSDEEP

    1536:i9RTtg/SoPX6rKlyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:ibpoPYKlyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\756f08a8364e040633fd834c514c73f1_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1868
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2792
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:406539 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      252B

      MD5

      ee60134b6e72556dca6bea98ac43a16d

      SHA1

      0cc3ad425dc3f4fe0d915ba2f7dc39335ec999ca

      SHA256

      964614c699263b0b13a18be1e3ecd55ae29b925acebbb35fedd72098fac71d83

      SHA512

      e9e4195b4551d9fa1c524c4f772147c563fffeeddf15d9ca71151ef7be5fabf03ac15e7983ae1abd003f533d9bfb8d84665df0f60df30fdb7ac55c0b1b224214

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      244d035dbb1588e1d086160225246f08

      SHA1

      2a30c630e24e0746eb5b409587c31a0aebde1375

      SHA256

      52a4344592be4fbee32a5933e0a2f45eb1c5fef337a21c91b71f4e63cd6d65dc

      SHA512

      047afc0e367f40fc69c7dd1cd0a6cf4839af4fe02e106d8f03b713716ebfb828df14419eef4987fe901bcd9435dca34022ba93523757349ae539a4ccbbd94226

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6d3a5fe1b1b533a77b96cba43304d810

      SHA1

      e6b7f27a43dfb045bee33eb7f42fd1b2f912a3f0

      SHA256

      8aab83a5ccfa5e91029d59e878bbc7698c47fb8871ee76dc796ca47cde924ade

      SHA512

      08f0629cf6c898001867c633fc91bc922cf38deff17313a0c22ac6449efd0879e2b912847b57844a56636566f90e47a1c0b6f6098b79d14e003b460cd1585b14

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f53080901fb65072c58673e5fdd669da

      SHA1

      babeaca50ae79d1af267927c417990b6e02afded

      SHA256

      4d91ffb016118c841ac87387d1053eabaecd2dbdb2a796412b0d0e1f5668aac5

      SHA512

      58517f93f1d483b60e970417f36b7bab4744d98c57788b5076e53805d8d143710e3844512f52565b669445400ba925c264a26bc53aa9198218177e734bb02e38

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8ab4a11f89493dfec871296cfaebcf7d

      SHA1

      bb840bb02f03abf04b0a5bb02b82b9c44f7cd463

      SHA256

      f6e34668ae5c9302086c86f69aa31d009548395b36eaea61867df4c19f55bb9b

      SHA512

      4e1b6cbd7f30a94a33767f9f2a1dcb19439672d912b4350dd193c2253198c29c4fa50effceadab6891db9e150126fd5b6c766af6c8f771100cc5475e9a7ad939

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      17d605a7030c4cd2070a1cc45d181f46

      SHA1

      2d46f904cec2cdf1dba3458aa7ae984d1c919839

      SHA256

      80b8bff583443f75157683982c898d066ece9392a3d84958e39440887a4b3540

      SHA512

      d94f4fa1d098104e0772482d1b31e13180a87938600912b1df459f3dd9ec41897b81865308f890872fe205ac4bf02fad7dd515bf2b9587bb905f12841321cda4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      55660b5b70d5afddbd9f82b9c716ddae

      SHA1

      3613b35686422f3f3e27e045f2cbce22d6b60a50

      SHA256

      d62e5ac0548e638322236556bd32eefd58bc87e5664e51211e2f561f671dd60a

      SHA512

      d4d1a9f09be91b099ac6071b0e74f754c68899089076314db1a51036e4a015af4779fc0b2689acaf8f605ed0575d89768be0b990bd2e91d40ab880d5abaf85c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0e332e2c1766679c3f610fa49894638f

      SHA1

      81117a9ae5dfd2e8ebea84143aeefbef1eb8b857

      SHA256

      d0e758c88c2194d102ddba1ed11f41501184213f36b5e61f4b9c0ff2624eb6cf

      SHA512

      bd6eb796e28785d0ef556405923199790686d8ff6eabbd6835d4c942d21b09a17d80f81f32cd4eec5bbd06765d4799ef14847005e65be66f7601e4e61e42c5b3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f2b3e0125ebbf16c2c4073d24ac08471

      SHA1

      13c67f9cb3ce05d8ef252c394f699453b0a41b47

      SHA256

      85d3b19fddaf6370c93729a9642e565aacc8137b605c48d207bb657c422defdd

      SHA512

      c3a27f9658503b021df647423d91cc205972e9598391d49238e884aa5b3868f22159463ab846906eb3a1fedf46d7d0fcfa7cb50ab5f24465c6b514900f34a70d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      67301bee1c77a89c8059e9d99213c55d

      SHA1

      0fe730ae26ea018fd1278b2fd6f588b7108a5258

      SHA256

      c5feed2e1249aee1df59d6dfd186328adeb8721e2ab9a1317123162df8a0e72b

      SHA512

      6b38763ff29e8d39e661bd6a3d3f06a49dbf83be413df1c1a5f6e91f23b783cd425a944d170e14da66fc6da39e22190fae93a61718a454a8cf827a0ec1562bd1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      dd617df0686754f781404a22f27364a6

      SHA1

      c8c2c68064481ca77ca60a7e8eefb8da44bc913d

      SHA256

      79b9feec1aa2a459cc8f473d8944b6b7d2e68b5d7138a7af84a05c80f1d37560

      SHA512

      ce00103ebf94af0dd9dfa9dcf9aee457650e5b5ab47f2acce00acc06e9a1170d91fd517d871b57bc41d09b0ca5a6006f1f7336bbab0c46a332cb27d7ed414a88

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0f280382c724b657ea4ee599e8c58696

      SHA1

      ba2262f8ba9539f1bece198a2f78e870080428aa

      SHA256

      17b8d4885a1d0693b55161fac0c65e4883ee11b3f43f190a472a7cdf3beb2311

      SHA512

      76be8d5b53e553a4ccc5e219d824e90b66883f467b1c8e7fb984697d029312f5e613c3dbfb3198130f9912ce85746e650939f888609cde008e4323bf84b89a8e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0d2f87b91fab099485067fe6333f6db6

      SHA1

      26f75bfdcacf9e5b9299e39493b06d696e45fff5

      SHA256

      7569ba178c463d68b29d00d549c686ba2e48f4eea5d42fbdbfbe469acc7daf86

      SHA512

      596af032ce0a12ef8d52e14d06a72371dc59787282049cd7b2856b07247ba4e0b47f24b4af23fb3d644c69bc4726b27221993e043b61a884f0a1bcf48e02f0e8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5be0d1966e6e9e911157457fc83cd53a

      SHA1

      d8143f92f9f448ab42952cf2106ca671f67c03c1

      SHA256

      ea3d1225af42ed976273b43dea1fa0b0739649d21a368944d0c19e015e464101

      SHA512

      d266880c9b54385f7ee5b6afd8afd5a02b2619eb55c6de77502bd0c19485e52dee531ee587961450a98c936266e27e9a05bf5db697e61bb8425812390ae32627

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b6ffa961c4d748a5f51b1589b45061d0

      SHA1

      91fc0ed6040f624eaec84b1b115ea0d68708cfb1

      SHA256

      4f9a1bf7a439d8fb0b73467cc498655cfcd96be95203547750e3bb16c7c7cc16

      SHA512

      ae62fae7a6cb81d67eee8914d6b9387018cf1d1dadd2d57b1a7d964d641e76b38421eefc47f555eb82111641e585d54cb714a8091627338d509dd39028151cc3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      2388a6f4f9d28ddde53dba2cd2f8fe78

      SHA1

      38ec0626980dee773329f462df414627dfb47971

      SHA256

      03d5a79aa4a6cdfc7e7fc50d276b84cffd0531fcc6a95592d73a3d6ca0f419c9

      SHA512

      85ccfdbd637e4f545a5799a61ee27b9d987fc420d8546db587c5ae699c51fb6a6e68efb91ec37103a4b317595977b6fbefe128e93677424ace887787da2f3dfb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1deeeb5df3c182c8410defc10c2216b4

      SHA1

      0cc83b80bd80de10d862742480a65e0d93f0a381

      SHA256

      5e305a7f31d622275d865e2b2a361a6d5b4c080d5855b2bef6649802b7ebbeea

      SHA512

      a54e6dfd447935f37dc386e0d1c852b3a924bd4c072cb231fb366fe74df414a8494b22c32e97bba4521331b12a2900ea059684b068e086ce94cd696ebb99aa03

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      cc3a5db3b119d5e46405f698af33d0d7

      SHA1

      7b527e8b4e5f0d8005650580e9efb1b307362d3d

      SHA256

      98892f033ca14d97032d80af81167a0a8c0c91ce55aaa7a6eddec5c892a7e2cb

      SHA512

      68b77ac115d9cd420eb4fa3ba75469751b3b028aaa057da7990eae4ed6d405c3ddcc7007c040bc03c22d7e061317e1ebaf945d27d74a57bb1acc6769c53cf1c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3cc3df6f5825eb20b24ce647175275f1

      SHA1

      1b2617cd9c932399ec79a46be82ab7e5cde77f42

      SHA256

      5c060afc977f72d8c8c0d5acc34790108ab956a07164d44cfeb04c310464ffef

      SHA512

      945b387ec065d22c8bea10a91029dc6e9dd969a34761ac00242164ed6c01b62b95cf99073009ba564ef799f7eefc29d0523a30c821df964c98f02a2b3ba1fcdd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a019e766627d5845b63461098929dffa

      SHA1

      f08c3df86e9d2838a1f129cbdc0451c70b1f2bc7

      SHA256

      2403356f5958df793fdadb6aa264b0e8411a9327597e06afbb76d793089d8ced

      SHA512

      ed31ed6fc17bd6b7f9c8718c1986ae82d49b2218c228f1611decab017117817e5e4dc5100863a25217641042745f3300d6353ffa2d4440cd558b42840d902a5e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      5f0158858c6492f6c2e7df76c2979bb0

      SHA1

      19a8f06d79efb8959ee5c04382692f7707ad7d1f

      SHA256

      70c7fb79c56bc9c2c04bea9c4be14a4298baa75d2d69a6df45d5ff8d946d7741

      SHA512

      a927cf8bbdbed8e6b2f91519bc634b7139417af8d21ebc2b82a7a0b661ee8de578481aa6110047eba537b3519671de1ab8e9c220c6da09055af95b379f87033b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\723PYD22\favicon[2].ico
      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Temp\Cab678.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar7C3.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1868-587-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1868-586-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/1868-584-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2684-580-0x00000000002F0000-0x000000000031E000-memory.dmp
      Filesize

      184KB

    • memory/2684-575-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2684-576-0x0000000000240000-0x000000000024F000-memory.dmp
      Filesize

      60KB