Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 20:38

General

  • Target

    76c25e1d74f0460bbfff513a6015d6bc_JaffaCakes118.html

  • Size

    159KB

  • MD5

    76c25e1d74f0460bbfff513a6015d6bc

  • SHA1

    f7e42ab171f48e9234da9c82840a47c26bd609fc

  • SHA256

    51b9dfa39c270e29c1309656cdb378ddc910ffafb3e63d6298c2b96424d398f0

  • SHA512

    964ae7a9c3446e89e94f325bbeaa90d8f2baa84e25a64d93e40462100c262871ab5f049a7c437e59faf2d65827083bbcc15dbd646f890c2aab3816baf1087f19

  • SSDEEP

    1536:ijRTTyWCzIEKJyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:iN4QJyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76c25e1d74f0460bbfff513a6015d6bc_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1980
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1500
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1908
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:603143 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      71e26ac97a4196d87b41dda5861a85c9

      SHA1

      731d8003fc4f3ac9e9710e30a35e5f447dbdd434

      SHA256

      25626aba2f96922f3e6ed93c8c570f0c8424a0e743968c30dc3b53a0cd62753b

      SHA512

      4fd61da6ab74c4b6a5c00d0a06ad2a1db97982968f7392cd4cb3c2b2b63d537188363e9259b7c4f44028a52afd08e087aeb3fb5d6250774317efd971c0f26d95

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1fc7e432b724f71d442b1e62972e19fc

      SHA1

      b610603c23aaaa6dcc0ca416e1887ca449dda224

      SHA256

      c8413eb0d8433010e20b9dd3f7d45a3637f86be398e0203c843e4796f3845188

      SHA512

      96c114d6c8445d7af741a59748c6aea77585ede277fa112257e7af8a6f823f3c175431635c8c32b62c28d8980431dd14045401482d801849502d31cd56ef1ab5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bc230a6959050660c742ac3e4ee55a0c

      SHA1

      be5a73f4a398ab5533b438e7d921d5fe8d472e25

      SHA256

      f71998fded1cf35006062db0a41c20609afb44c8685500f1cb8713ca41f59061

      SHA512

      e4ffc151b7c4f61e505ec30e1e849baccbd358e5493fdd25778a80fb2661feb6932a022c7d2485114b8dc22c535c9b04dff55644b037a55fc181799ad3848984

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3015840ca93cd320590cd4eecdbc0b7b

      SHA1

      10de27d3a2ba9e738bd999f9016502a8c4d9dd8f

      SHA256

      383b61a5ae5dd9654cd6ac2a9e2f4ad8094b2b39706aad40eb4111dadbe36ab3

      SHA512

      b5cd57c2abfc94009a393ab8082abd3adee96b5fcf7ca3a99e9353e3894f6227c034e42cd7d4d36774480072c1b7bca4b9ea593dbdc4a8a3423b0d3a27dfd513

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      04bc4f55ad0aaedafa7087ad43aef6dc

      SHA1

      6e83fecdec62d308e947f8b9313d424fcda16a49

      SHA256

      60b5e1cda69f041392e8ed46b50899bab39727de976267dd78b1121f9c34dcd4

      SHA512

      5337ccd7da31553faf6da317175243d83b4f787e9ad57ac55ca52fc61b04ea3b7fdcae76826375c80c6b4d162dfad704065d8a39ac2969da43690455f600855a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8fa5b087ffce65b043b7112a7929d664

      SHA1

      a4daee201f127a31a580ecbec818d603e3c3d183

      SHA256

      ebb6297ebbaee12b765ab5a093fad50e16eeed5abf113dc2c62a72d4059938a4

      SHA512

      a334ac36b4db7aa7df2b5983a8de1c3c3f38336a40d080c3d30c23c1ca80f6fca2819f088a4ff9d358866592ae9c298aef075629484c4ad8c5689eb006bf531b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3798f2c3e88c25232588bf78cfdec1dd

      SHA1

      fcac2823dec6af242ba7c5d1eea0bad35bf0f747

      SHA256

      a1def7de19254a32927424ff51187c2aa762760cd116d2485d80501bb6d4386b

      SHA512

      6110d8f1e8b17d6719b2f13abc513eeeca25684eb96af2958dc92d2c8044e45a78a594cb966a13cd04bbd4e8012c909c67cf9bafc547d052c5f0e2947e5a813a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      39e59abc25a5fc24911df5396b2cc583

      SHA1

      6f9a8c13c6689890d0a732186928cd4262fb632c

      SHA256

      48f26d61b5d9da8ac84973d4dd0e7cc034782a1e8e21711fd42f018e25d76d6c

      SHA512

      e500ad02258e2f348a7abc3adf45f5cf605d6b16b8d6120f22f05215d153c771070df76313248090395f885d29ddb459e5b0a1854b832fbc640de059d48e2aab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f94de2ed7928cba06d61c98e9668e3a2

      SHA1

      79777148cf10e23f5503679dea42f28f6ad33ed1

      SHA256

      c27768049163ec8fcf55a6bd0ff1ae813c6e78b8463aef0ea2d95e0dec15a5f9

      SHA512

      d97da0d3f031ed77d5a4f3005b600f87dee4cb2daa8891a6bfa8bd7b6f4345253b23cdf227803c3a3925a0969fe7ac1bd9d4466ba60e4fa7884e0b72692412c7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9390a9599aef70ba5e0edae22d905ea8

      SHA1

      523c530b4518c96d80a9ec1879988d125c2032c6

      SHA256

      f0d893711026145458abe7b18352b210e2013fa341bc1e2bcc9315116512eadd

      SHA512

      e8ffc1e7fd80e7ea99658add856f0bc1cdede31a6fb0193364af31f31b9b9351048b80a2687c2dec08d8e318949ffc532eba12031cc2a72731500507a47c6890

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d1ef59e23311a743da7d95fa96e1e555

      SHA1

      da4a8d59336c51213cb6e575b3dbdaa643ebed0d

      SHA256

      f056ebfa827aa53543602505d639034e01815dfe9cf86ebad718d0028dd55a9b

      SHA512

      252b14fa41aab4422e288f33ccf3c275b1183d961263df472d7593999533bbc5c95416ceef3cc239308ff5a48218ab8516cebf3c521810a2b90001c9d815e08f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8f1d0f7b586e00574e654cde954afd25

      SHA1

      6d7a37da154ed1512dc2b7c0d4dc4310924cf24b

      SHA256

      d9869b1f7c7f4676b4fc7abf8b8bcce2f1555de20c42e6a47c99998e011e0b31

      SHA512

      377121cf02560bcec62f85a8df718e6ac578e701fb8e3c9f1ec418caeeec585f4798c855466dcc34ca02b39b4b739191921dbd8e1aa2c6e60057ebea289ca7a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      004a02e60cba662a3e0cc48b163de146

      SHA1

      bd960d37fb7369c5aacb92726baa8da7b390b856

      SHA256

      fb9ca8b18efb0a349cfdce8ead23559e245745017cc9c30313bb2a928dd6dc78

      SHA512

      fc7cd90ff5363b36fe558985d44f0c60444d77f8046e008901fa675d927100ce24a789930f2b4e3b2d300ee96fce4302632dd4a4badadbadb5f535b7beb7daf6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e6c181f156fd83fc0809f4e64e8165ed

      SHA1

      48cd0b52d834a91ec6aac970c012181d47bd5099

      SHA256

      a9e6120eb4524df73e37402a4bfe343fac6d4746c87bbf20c8837d92ad21644c

      SHA512

      c4a49dda490b94c023822bcb4403a523d7dcdf8b0f1eae904124c3c51d217ff1b964e093d594108b0719ef575a9cc450950fd2e9f2d5fe9842b63aba328197a9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a87d611d02c41b931907bcbd84a0a3f5

      SHA1

      ef066c52cea3760caff8c451186a807668a37aca

      SHA256

      a2e173307a3d51b7e8ff93af90aebeaace5d4fc7c9a8ad4d158ec8228036f956

      SHA512

      a136c3e362ab28a551fe799fa38e01e8cde43651aaaf2e80b31b8ee949307878ba1d08f689fb81b5714b7a51c3345f05f5f8f9974104c3d2c35540bea460e8c7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a22674b222a71cd4f7e16692a5f4ed95

      SHA1

      8a9a2d5ebd88f87c7c885dd0576c9dd719c01bb2

      SHA256

      1fe0244feec1eba9d1262da82d0947fee60e18b3c1f39272c114771a4fac7832

      SHA512

      052b5c1cc0289a4012cdf8d731e626e92db22534342f39230cf0271b15d910fbd5a5a3a4dea6b4322b85a8e9f8b272f55c8afecdb14b5a234a7c13a622f84d0f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      999a5cd74c4012205620397a44db275a

      SHA1

      3b14230bf948391cea1102a3780a73f89ca60967

      SHA256

      b04cb0d17f9195224275c0b5e461de0c61cdbfdf423abb9efcc90e7617f5cf08

      SHA512

      2768ac89928fd3170c01e8aa0651655af4ac11fc078d24fa6d3ab12e9b9a48acee588ffb1f49f948cf8ad2df1c7bc1bf296308f05b2960f692c17932a06f1b53

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0b7ce7de9f0ad475f608ec8a51ab631e

      SHA1

      4ece71772edb22c9a892c0d83ebf193f52cb5434

      SHA256

      ad293c430c39e29470879bb273c178f5caeca67be916963bad951c83f9f9ac9a

      SHA512

      dfa316746e97d05156370323df29f67d8bbc2ae9cf2cdeb73587789ff0670682204689496ef763932255447b40d8cc5cc757e559bd1009ec9ed38be52f9b5bfa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1f31c4d7e7e78baa96895937995332c7

      SHA1

      b06a6be34ecc485ab0c9e481b59694ae4315079b

      SHA256

      6c18e6509b4263b0d31c33e21198e982abbc0ca89cf2fed73c6d50ed303a8036

      SHA512

      b3ed62330bbcea994d0c790fd33fd0e2784709b79f6b48b8f849b6311abc11ad7447ab7f99c72cd69b9e9210eb68d0283277b77675e503b527be8eee8ba8c896

    • C:\Users\Admin\AppData\Local\Temp\CabADA.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarBCD.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1500-492-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1500-494-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1500-491-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/1500-489-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1980-482-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1980-483-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB