Analysis

  • max time kernel
    130s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 04:34

General

  • Target

    77ea057be3674113bddfcff599af727e_JaffaCakes118.html

  • Size

    155KB

  • MD5

    77ea057be3674113bddfcff599af727e

  • SHA1

    3d1fd031ff96f81d5a568bf025034ab1fba98f4c

  • SHA256

    60633329ba86a4ce5653e52030b1ecf24a1cdd378484f174ec2412d8fc69a517

  • SHA512

    75fed8b08e0d57e01189099fc820e8bca89a20446819bb82d8c449bd973d6b6fbb952a56cd2db871c3c56131096fbc99bce272ab13241fee569899e48951248b

  • SSDEEP

    3072:iUE0Ol0O9GyfkMY+BES09JXAnyrZalI+YQ:iK09DsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77ea057be3674113bddfcff599af727e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2444
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:648
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275478 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1292

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      934343fd09e1d9e9da74f1c50b3ba5dc

      SHA1

      c26a1bdfc22879777d2f6301baea8a8f1a1801aa

      SHA256

      f60262629cb456a8262ddc5c71cc02306cd8d1f049781681d616c750c689a16c

      SHA512

      27a45f4b6724db22a49807b8bbde902082d5e91711da5244d4da090b01d0356967d628285a5f06cf9809ea95ae094c55e626741a65013022e4864ccd7f97463c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d5108a94bc5b3209b3333ee7a9db0507

      SHA1

      ccc7d8fd4961a655f005fad1f92eee9c90c5c0fd

      SHA256

      2f6009b7de2a57de775cdd9b527327f1981bdaebc3dc13a70767ba1c60ea6924

      SHA512

      7dc45e17e218594c1f7198bfae1d81bcdf9506676b0b901d3534564f1fc2847c9772fcb988f91fad44118644cd51c6b89918c0134102b414a8f68efc790bce8c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6ba69a05eb204700499f03feb59a04a0

      SHA1

      f3fa01ac0b777fe4db7a33b02ba6fe48c486e99c

      SHA256

      58779cfdcbc456340d52988df3b79a06b68c86fb898e111554dd2673a7b6156e

      SHA512

      2ada8495914db89b17ea447063e65fb5d4e46295b5b850be60166ffcadfd9b887297d60dba1d25178eab91aaaed89c54ca5780c1b7b03dc1f8e3a78c20e3b9b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e78c231e94213c143847d0c375e156e8

      SHA1

      39d887894a1432190ec8194b956020b3367b1f10

      SHA256

      d7c9f7076e7a9f9a4bf9190fc2fd7a99048e5999f57c90b6cae42955ea8b830b

      SHA512

      68af5e92dba340e38f4b384705a489a4f77815bd63090040344d7c70b4a7de8e74b78328920eb3f394baaeffe9180ffbc192b3fc81cc1ce7276bb21ea7dcab2c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8407e0cc82b7a09f3b2a591aa73dfbd6

      SHA1

      d19b48d2beff6db58abea239f445a0d4cca27b75

      SHA256

      35e2f8e81a566bce2da27050606182df190668cf7cc0445e1113ee700c8ec28e

      SHA512

      310a03af089f5e6d758c84329d0ddda5b63b04304217579411ab0dfcef68804d5896ce190bd9e6015e481b6ffc7559887b3587df4474e95215c83a5b28544332

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b5494b654ab83737f07ba21f78a615e0

      SHA1

      591b11613f6f3a03d5533de94394f6309421ad76

      SHA256

      469dc2ad6a80dc85365b24c566032d0eb6d54e7d132211794241ccd452447909

      SHA512

      10d5922f98c2d9b44f7d3d4d250d6fc946b05a820f63a81c80a3548ac9072b0790cfd3cf9b5ccd1855058248547a462b84e26e100405d67462cd23b8f7b7b5a0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      49565b85a099fc1e946180707f72a2b3

      SHA1

      9fdebbd213cab02557613949fa1598a09d4424d5

      SHA256

      bce5af9c1c1d0e19d78669ab56163485f9f5648d0f893127e47344dc4a295026

      SHA512

      dd08ab3f4f561f9a529266d57494a75d3e0f4e4ab86417ad7bf42c90c53d5f04b7379da5a2dcadebbf0344ba09ee89f47428722cafb6c7f4b5458d94b35d1bb5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      35937a14ba7ca73c55aa80a16e43b848

      SHA1

      dd95897dd49c43c9d48a18442126b093d1823617

      SHA256

      f4767bda7b43fd1fc89c5d9ca46966aea610282052d97d36f385762e72b996c0

      SHA512

      d4448feeabc4d452c05c59d0af85343cb2343dac89b668488604ad407875a363407bcf25176a1d6fc3c151311b92de030d2107530602432f9cbf9dc343d4db07

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      030e9a8c598bae979ebfe34eff42b31f

      SHA1

      871e12fb4775912907130bbf1fd46d7fb57da4c3

      SHA256

      b2e2ffecdea5d97bb786d1523ec2a015b4459ea23f8d131ed2452df576865849

      SHA512

      f4923c006ea76a68754d0dbe5bf22b01f9215774f01d70057100ac7423e68e51dfa2ddea1f6d6f00f1e3787b2c1259e0e40535f50eaa80f39df42efe3d5dbcde

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4bf9714565cedb2cd53b09c0cb8b4e1f

      SHA1

      5656ae69c6e0b239ddd46c3b5f5c152580d824e8

      SHA256

      0726425ac6cc1448f57466d16303f1f3436ece217c9fe346cebdd38f5bcfc501

      SHA512

      4f7f0dce70535a8f3835f2a766316e87b6f7c4356479ae915e3e420bc9ed829fcae622de52dff1b846045a3df32070e3eaadf501a7d919622b7e9aea60233e84

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      89f6a0f994df4d028af32c4c5e80387a

      SHA1

      e1076be907f24f83589594f6e7209cc0699650d0

      SHA256

      cb6c2b22dced426fd7dc5b113b1c0732a94ae8e6d683a5e5ea3a3fac56fc6318

      SHA512

      61a470aa6897c21cb3e2b40f2f45e89fdf6b641d6ed37e2e749318028dfe870f954db63aba6a07708cc75ffbdd013084a2ce2bf443fb5625cf3a85fc728842ca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e7511ee3f83980070631f11109953e3c

      SHA1

      be65581787f6dde76f7616c47811e79ed4936d8a

      SHA256

      0fe430dbceb2bcef3c80e9639d2813c78d081e1c49bb5874a30cf1a63ed10f58

      SHA512

      8aeb8f6ccea30908c9c524819d61387ff6d62ebac480cb3d89d0a0ed6a94c40dbfbc1911748ca1611cb3d6c94087e659f15e134b5e88f191a6296a527104e7eb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4935100cd3ebebd68561363762c33d17

      SHA1

      04699db125584f88ae6a37064a5b86b3ec94f1f2

      SHA256

      cdb4013c202b2beb765296ac7bc44a4d7462b3fdb64c53c4e4d68b8c5aa2d239

      SHA512

      60d0c3f191db5be035fae0e04ff921987d0b291c713deec2325221a29e8bc8ae58740c921c45e0eada8527b3d3c3fa83a708a823a13657c25cb9859b0e7b5826

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2125574fec67c8bc50a225de70648879

      SHA1

      83d5833c5aef0e79b716c00454d88c0238cd2866

      SHA256

      d3da7f7028b996d82013029125a8f2cdd6d67fa25efc8ae17be41436273c4609

      SHA512

      6a989838534c505172c8a3e7d1545cf5b2c15b191598f20cd99aec6be77908b39275c2a10c9631795fceddff58b59234e9a4532608dc0f2d56ff57079bdd5242

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8e8d9394a17409c6c05a1126657450af

      SHA1

      27899e69b530fb6706909c8dc5bf025e6d14d3c1

      SHA256

      121ad231f499e2d4c59f27671e74565577fafd2b9c1c7c40d1c2e049593df344

      SHA512

      84348074580e06ddbb38364166fb9bbb2502698af3a22b9789062d2b1ba767f4296ae8b8a2f24d210859473ba33b46485254b4b53a325d75ba163eca96358563

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      00ed506ea3d2b97afeae0c07d3a95d00

      SHA1

      826fe24fe6cd77de9bf81f09768c1dcf1142a0b1

      SHA256

      62adcfaa5318a8146a8d857750c3cc080a7a704d6721ba96c5e53d9bb5aa10c3

      SHA512

      46084380cdf3177a0fcc179cb10d07d44b73f19b467d23428e03a161a4c34f529ca29ee6305aba1b8e9cf414b0672d46d5d6b5787c99ac94893079965bc265c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2e65a79953375c687ca6edd4b8a52dd2

      SHA1

      95f098a339f061a3e7b0bd09aa66cf021f4959af

      SHA256

      84aadae54dc43e8e2dfb0608fc1733c2abfa6b8949a5d7e92be85fe25047542a

      SHA512

      f42dfa84855750974dfdc75459349b7178a93aa80a1f92f8253c90e36a2c3a700c369d8b11d7c9d45f3a598b25efe563b36bc13430428df2c3f9e790f66e1d31

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6978bb62920846fd3d9921f303945322

      SHA1

      a29f2378b0650b0a3a2d31eadd845761da31001e

      SHA256

      13cc169e831dedaf0ff4350850c03d1b29da84711533f646ad10a5adaa78c2f7

      SHA512

      53ad679149d98846dad2cc3ba292faea1bfd5579c4781a235e9bcea4e225bfe5b422e1c325ba5bb11190e452a0a583316a613d7cf89f6b5633013d8065dc9ff0

    • C:\Users\Admin\AppData\Local\Temp\Cab24B2.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar2513.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1760-435-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1760-442-0x00000000002D0000-0x00000000002FE000-memory.dmp

      Filesize

      184KB

    • memory/1760-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2444-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2444-446-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2444-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB