Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 17:59

General

  • Target

    765418f79f8362a086f0c19634da12a1_JaffaCakes118.html

  • Size

    346KB

  • MD5

    765418f79f8362a086f0c19634da12a1

  • SHA1

    0b4b8491f9f4b16681b83b7aa0e519f92c62e1a6

  • SHA256

    c99e0c0aeb0f4f3a19a845f233676caae2195ddb63459b7dfb7f56bc29b85d1a

  • SHA512

    3fd039709b898eccb6d00450aaa4377ebb7a0d7856c1759df2db644ee690bc7a21c4e1307fb9579c79238299a849209a88e3f7ee88354008743da44549c9ed37

  • SSDEEP

    6144:ysMYod+X3oI+YLhEsMYod+X3oI+Y5sMYod+X3oI+YQ:w5d+X3m5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\765418f79f8362a086f0c19634da12a1_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1872
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2904
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2716
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:1048
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2976
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:1952
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:406533 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3020
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:5846020 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1596
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:209938 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2772

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          5f7be32efb8ff67f76c909a257d6ba1f

          SHA1

          9c9187fa13f2dab5d11571b798718a8d9bfc4f3d

          SHA256

          65ab2a452957fff227d07ce15e4d35c4878723606bda36e8f9ba5e85094a95ba

          SHA512

          e8a8c81fb7158dd64b9b421c2854420c27f49f546910476137caa0ea24dc53437fc0862c5cb51e2e0c700b288bc58498fa0425d607d56c5379f67a35fb8bdad8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          443d1851b2fde43bbd5fc707195f03c2

          SHA1

          3bc73480a746b7e20c78d4d2b2bb213b3f615f72

          SHA256

          e70588277bf1ce8cba47f7378dbf759a53c20aae33fe21455fa55c597ea1dcab

          SHA512

          0b0dc29e21abb10b56089f7a663233fd438606b0a03e546552b702e329abb9485b0b8c8a97457d3ebfeab13ff5732783c5262a328a3c74f8288650e33ffc5c40

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          62093d444f86a15c7f697727976d5890

          SHA1

          728456c68206e7b3774a1c8f5bd0dc8ba7adbe1e

          SHA256

          fc1c7182a9de630e45eda9fadf95457acec499b37155a2217c418ad24854373b

          SHA512

          3ac3f9fcd7045c531a004bc82a17ecdf93974f96576229b41764776d10696da5dda822453269b44d0286fe1d453a3908cd8518045ba82b0d8615f83bf08cc526

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          50303c5fd2a07c7ec8cda2ad205dc219

          SHA1

          9bcd5a5325a6b5dab13412e84a4b99a1c8ed23df

          SHA256

          c75444966690f6cc116bf8ca87bc372cc09885fd5967a1591971ffd79491c0b0

          SHA512

          a15293f2034e9c3e8a234c422ad1cb1a9f08cbf271ea1d5283eaeaee8d2116b8d13751d3c8896900da8a4175053943ada01483b5452611c315bdbd20aa8c6bca

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          b2ae2b88c01ccb34482219ad8d15b607

          SHA1

          a0499ad545cb7f491ef28179f562552c1497ede9

          SHA256

          a1d7a71a430afe8eda373169a2f18af9446256a168fc2ca582ccb522b6581a61

          SHA512

          61f0889ffffce44d86e20a58874ae1a073908250f5d48e5b58043965c637123b5bf8409caf4444147cbe976336c476f6db19ccefe95d8f7b0e5d5325369c9f05

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          8e11192e6c8298dd6f3493e9eed2accd

          SHA1

          29b92091df35d82cd4912517da2d5531c0d13f3b

          SHA256

          0775a04556522c4fbdb569f713162b62502fc86b77ac7619bf7642452fc4b791

          SHA512

          ffdcdeb69f57831efa244f2671b165b041e2f05dc4ce43fce3c1e94e04f4c28edbfb9d0ad53a2f965caa447b66e00a708bb651fefb0b4f7589a8ae146ae905ae

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          e5e00c3b90c9c66fd8e5e9c50ca68ec6

          SHA1

          b8c18ba739e56b909753fefcc61fc6cfb7a5857f

          SHA256

          5ae05d29b4f746f5c763bcca831f90998a09ae9f467f0b1d9d7dc5667bb14943

          SHA512

          cf972e69537abf5785355402e79018ce54973151a14237bf82003446bcd25691a14bab64dab64686a4caf10e4e9b0de1432c702ea1a7c80ba9d26fc0c447f833

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          f9e8b32ac1b79fe5112eed8e83684189

          SHA1

          97b7b346cd66a8c8b67f864b7a8d0bd0f41bb9ae

          SHA256

          de7216e754082509ea937c14233e6e8fa53842cba76609dd4135a58926525ec8

          SHA512

          ca49371913563b72b855436495a33198d80d88b4b67544eb982646e716d8181d8af03d5267d9af4db8a8c3c6e8156e1c96cff39ce284f0fbfd567227a2c5e927

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          92a1c6f748ad5dca6679ac1eb034a118

          SHA1

          c44047cc37ae3e20ba648432e9609ae41fee55f7

          SHA256

          ab27a8c37c3d9bff471e6a8fa51721e98e2e10f6216d0fa370435b0f559ec956

          SHA512

          118c266acd44dd45be6094a4df79ef7a498fc8b21089c66bcdd6e8b463d3eb4bdb6efdc654c20af13f490ad54146a6d3e14d84c9861d5e3093d358added7d583

        • C:\Users\Admin\AppData\Local\Temp\Cab3111.tmp
          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar31B0.tmp
          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • memory/2528-27-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2528-24-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2824-6-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2824-13-0x0000000000230000-0x000000000023F000-memory.dmp
          Filesize

          60KB

        • memory/2824-14-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2904-18-0x0000000000240000-0x0000000000241000-memory.dmp
          Filesize

          4KB

        • memory/2904-19-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2904-20-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2904-16-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB