Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 06:53

General

  • Target

    784221b00130766ea155c7eb95a60bf4_JaffaCakes118.html

  • Size

    148KB

  • MD5

    784221b00130766ea155c7eb95a60bf4

  • SHA1

    9c6ba342da64f767fa632070293ef723d6c7eb97

  • SHA256

    bc483164aba244eaccb51f0382a14eb497174947f1d0eed6a9b4558a2d888d78

  • SHA512

    4a43f8aba07079197d1ad546815ca278ffba8b6f2820a598d97a0d730942dd63defcfccf5f9a8862808eb89b6962cfeb95eeaac0a8927e55b4d31ea5b205519c

  • SSDEEP

    1536:YjuX4iuUQCHJJbtfPHbGbGb7bdbUb6bmlzyLi+rffMxqNisaQx4V5roEIfGJZN8V:yuXfXmyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\784221b00130766ea155c7eb95a60bf4_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2532
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275467 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2736

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ae3885e27284270863edf9b90e4be498

      SHA1

      a782e9ef69c3f4a0baa6b4b85dfd593c7319d22b

      SHA256

      f4d3a24a0693672b367056c593cf849978e772b53ea9acbe0af850b07336bc05

      SHA512

      fd12ded6596aeca91cbc2bb45d19af87bfa259b41357c1f2fa6c376e8f4eb48db6fc0b6b5a24b09ee02af378185d63ec6b408cf6609cfea0ee861eab239b64fb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      67b043afce7dc450999b4ed2ac096da5

      SHA1

      8bf042d4a9a18a722f47e3ed29809df4152fa59b

      SHA256

      ef56702b176d6690a889f426f8091df41648ee55343375aacb9c277a46d424e4

      SHA512

      bbdc59bf93c576d35f03f9c048ac0ccfae522e9bb3076366a75a6442cc6a177ac943299c8cd6a912a6d6d67f0c4cd6fdf1f3703a31714845185e1cfc967d9a75

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f6c3f37af7ae4d804f7d2fe5720ecb7d

      SHA1

      55768a835f2288880dd40c23142b04ca23392cec

      SHA256

      0924508870faec2718320426b9d68201d0d0f58449514fc509db88490ef364f2

      SHA512

      960d2868e43b9e1c29961f063231398b9d17902bd2d974e2551bee3bff7e9a86d89914d04e8627f79595ae6f38151ab3c2a86f7d669eb701fac8338d50a63206

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      205fcf35dae94d31b2e69b29ac2a9a59

      SHA1

      9a7daa8ca6e12463e108854f02f051db4715e0a4

      SHA256

      95fb11056f90f5378f36c531ea73f959a9c34f27176c9315a36a68a30d87851b

      SHA512

      b566059a4fb41f5fac490872dc8646a269b09d1d1b5fecfbbb65feb3154b9b685330396a5740554fef795f0dd2ad4809c1ff5ee6139969593828a8ebdec7af84

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0d9011639c78639c334cf306cc6b486b

      SHA1

      8016d070c30097e1263d8d5572c4f91378e2a523

      SHA256

      36256080b7c147e79402e9406995b397ae5b26fafac808b013ce11cf5c7194ae

      SHA512

      207bdebee4941dfc17bfc343de7ba61d3c1dd06d7bb8f9128e478eea24e2d78eb949e0989a19bba4410d951be6b048e0d59525cf1d992709fddf5c91f8d616e6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      835af38c7e0959350a9217283833a72a

      SHA1

      f4d189d24c8a3ebf1efed62b5087062909999030

      SHA256

      38e498d569bba4fd5d6440cf3aa9a38abdd907da0ff35ee273128bfceaabd57b

      SHA512

      2ac5ce1a8320e883ff36c2e14053b0aae74b52f24295e5a6063ceb4a44d5623f2403b3a316339430192b23ff0ced9cc4a6a7acdc5a364335c694cd5fac1bdf54

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4f2046f54eae216829f1637603ef4f1b

      SHA1

      d78a534ad1285536afca5a8882cf8bff470b4369

      SHA256

      11612618684e7fefcab01e1293af1f914370c55ccbd9394f3c751aae40bc6e51

      SHA512

      9b8eedc8f607dde30274f6a5a2b174f80e774c94ce5c52c24fcc209a953282884b51d313fba0cc5be59214f4609266fbdd87b4ee8599e56001c6c6452c827089

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ea01c52a06a0da31efc9b3f744f8fd4e

      SHA1

      04f29338ce805cea1b3d379b61f5cdc13c32358f

      SHA256

      083ffc895820b9ac516c596e4b30223a9e3acefcc1c11ff9a448391a1818c2ea

      SHA512

      3a666abef9b1b954c4bbfa941521a00d93b22946bda75d11417f9b4cfcaf6df3cb42b03f044bf83382cf9030242a4f8a2d425066b21e3130b22f86e9c3940fa5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      740a507f3096d046b391403eaf62b2e0

      SHA1

      c640cbeec2b354e6df106705910239a806309a83

      SHA256

      fd3c8ac458a46138d3f9795a437efaa21a176edd54c6d1bca83d442eb6258b71

      SHA512

      3278f0fc81991980a5e0d32ed6d8706687cde1d700bdd44dd57adaded35ffa95d8e99137046283fbd37a420c35f5e95dd848d1dc2e6aa41639822ea96ded24fb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b3f3f6dae9f1c4302f585d5092adb25a

      SHA1

      b4dd91b392963ce38cfffa12860260986d282868

      SHA256

      459808a903939f4fdb8ecf8d969d57ecf659b5023748880cc4ab9186037a87ba

      SHA512

      1d2b50d9373e7720647aff2001f4a4830ead8f05a44a29c4457989dfc8d525bac6a08733c63792d77bbd3f5673c37c79d4a11ceb012fb2b860cfd016f0da11d0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0ef7c4aa62981ee5708124d5e7ad82ca

      SHA1

      46b7e240d9969038ddef0f9aa41f2595f34947e3

      SHA256

      5d36dc38c93a023fe6c505a792cccd549000ca07fef5e87182d7b97d93bc1fc7

      SHA512

      249d1a5197823b69eeeefbaf575a6e334a261c1d344da60e8a0e281667156305ab9f3722d91f4d0665e58b71e930baf04becf7c96abbdac50265fc9c858ab6d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6a5649e0a498e53789d6bf2c518e5c7b

      SHA1

      4f945039c1505aab3e355192099abb703446ccfd

      SHA256

      3e60e966d373f48e402ddad5d56e3a5782ffc05032c3d03561058e4ba40c39d0

      SHA512

      f7389341c99175d1494c37e7a305a66770e2d8e1ad288e26a33420035df9bac0dc072c434edc2b2b5950e6ac6cda7e4d21aa46522710674cfe94e6075fe772d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ba3d6e81e03cb129788fb19d34385773

      SHA1

      6d5fd7dc7f2f240ae9d440582db2c082762da2cd

      SHA256

      0aa2ac9780e04d0070446ffab6b4e479b05101f87b8289cbf0945f008a672cb2

      SHA512

      1bcc9d78d0fbe1947f45081a48561456e4df99780b63df1541a1f6606b409967b2a7eaeb89ae1a493d4c4ce0b924ee566f38b17fcc4a0cc346fa78ab390c3d2e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      425e90ca1d5c03c8a9a11cfeada26b48

      SHA1

      6fee0d7065afdb2720e1365f79bdccf9f548c39d

      SHA256

      829879ac1ceb89023f443158dc43ad014cf2480e508f746a3d594f46d9f41b2c

      SHA512

      57aca9e4b8bfafb1a2b393d127f0dd5e12587344e9bf7785b41515e7c49746fc8bacc02f1468985c60eefe310febc8ab9b1ca61e2335e4faa3d1a1b2c3d9b56b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f5030c353c920b6b2aac1ba5c937fb59

      SHA1

      4614cdfcdde43141bf438b69dd6ebb5baea9a116

      SHA256

      362089a6b07982f87efa626faab4a7eb0e462a1ecf14d08ade545fca1e6e95c4

      SHA512

      eb2da82200fd8b5945b2fac0db7013a23483b680107714013866fa81c00acbd68d8636dd842bf271a7c8c35ab4a35d3e439f4572f798f657cdbeb745e47d1aff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      dca7b4c51603993adc238c7760acfe82

      SHA1

      e104c16ff36c58d06f5a150f24a4e3837d926525

      SHA256

      7e549b992c13b96c60d6ded692bc1fcff31070442c3be202874f5141ed0f6588

      SHA512

      8b215a61ecf081bde57b3c99a282869587fe8b180f8dcc4dd4295daac4aa8d19b14c42b4dd7268e43304ea11f91d788e32c375e7817a3dcff93d0344d9554d1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      48d5c0d40cbf5ca59e18ffe851c35062

      SHA1

      af30874d8a1a0d8ab8286d67236a9a7459c4e47a

      SHA256

      e6c320263f9e0f42320fbec9445dbfd29dfd6b85c5d1d0d10cb28e7a764d8739

      SHA512

      f126f67d816d775197f1f103ae8cbf3e138bb1683f521519f87327279e3ce57534959b163731f0009ce6dbc3acec50b86a39c1e384a31a27b65c4dea8940a9b1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b6bbda9f960fd6951ae2bbb69072c948

      SHA1

      6cd28066bb8ab3f33ebef62c860d784dffea38c3

      SHA256

      b936ae66263d22677661c74b51a3feb6f77b8f6b076fcc68ad6262d04350f959

      SHA512

      1fea8dc1741dad0e4c0b75493b9b8e3fa8ac701b81695fb3680fbf1a0ceb234e7430ff6fcc4eeebe03a3f00db5edeef880af7770fbe535163e106d4166a27db6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d724903016c50677a1df2c0b42ed87e3

      SHA1

      4f2da4224396af085386b964f5447deba285b9e3

      SHA256

      3e9d64f28d7a6a4222386e6a374324177490444c777c7f9ced25576d733c3bae

      SHA512

      8a2d288a03d6193cb8e3a81a591fb7a25d61a5faafcee8c05128c0c47e721470a00f3d49198aeb39481a60b574d3d3dfac5a6d565b387db03cdd8c40d75fd204

    • C:\Users\Admin\AppData\Local\Temp\Cab452C.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar461F.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2640-6-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2640-9-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2640-8-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2684-16-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2684-20-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2684-19-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/2684-18-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB