Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 10:03

General

  • Target

    78c76cf2c71886dbc5ac3207abc18869_JaffaCakes118.html

  • Size

    258KB

  • MD5

    78c76cf2c71886dbc5ac3207abc18869

  • SHA1

    2400c89b4e0b132e63426f8e3ea4d40644580399

  • SHA256

    4a6c7e82529375ce37b2565c37b88a13e97bebdd5775a0b7b60bb62b87bf3ce9

  • SHA512

    572c73fdb82897dea56cfbdf7993905d63dd8bc3867457f729b374272cafebbd336cc8df73cc57f25acbc5e6d930ff2cae3b71b042d1a774b7facb81941f8127

  • SSDEEP

    3072:Uu4X67pXiZe3qBxyfkMY+BES09JXAnyrZalI+YQ:Uu40iZe3sMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78c76cf2c71886dbc5ac3207abc18869_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2436
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2424
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:537607 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2876

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c8427e5d145ee3fbf09b5bb6b3790597

      SHA1

      9641f4038ef80507b2f1c3cb73a2b61244c77deb

      SHA256

      32be56abbd2da9c1dcc4b4591840d2fcbfa620a5620748546c19b0f38f42b92a

      SHA512

      64071fc297de8a6d56d32f627e97fbec4a772e234b9a99e9ab73f113a9e2894ce562be893767edc484ee8b7d861962ee7282c66fa2ca3e8b0ecbde45c5923606

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0f9551f7f19ae423d16cc611cbb2f714

      SHA1

      2bdf0b1e3fe29cfa190b45c1c1f7f2b00217be8d

      SHA256

      deaf48fd205950e3de4f4948d44643200571aceb76b86105a3356ea628c0cd73

      SHA512

      49bd910e7294961d706666d358d4394fd80a90a734c024c4182ef77ca1a628210ed799f7986c3e4e47138af0378e947a7f59ebeb5f634dc8f3d7f27b7b6e30e8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ea8959de84aa88c20c330a6dcf89678b

      SHA1

      2b9e1d36b2cc8e608f9f0b10d2a1536fd814d61e

      SHA256

      07c3556fb1381bb89414e3beb65a411e73e2aa67d8cdcfe9f6615236cb7e8cb5

      SHA512

      d52d450beb2859dea7add89da9c68c96f8145f5f0be20f20fbfd63a0ae3d58a62ca3a9f85b88a9b35283a509b466ae752ab680a595d4ac28aabe06ef155ed86c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ba1d4b8169dbc05ad5e814951c575d39

      SHA1

      d45c5672d2d33feb54b1c89ea9fe92f15651fe6b

      SHA256

      5330c28852e1f874212f4cc9660891ee3114b65f20b4c6c2246a7b8c5806ad60

      SHA512

      198c4aff88f17199f9b2b971660b98ea878fa22f1e778cefcbd9e3307c8d7016dfedeec4287638bae2f2126c06bca393b06e95c9f8545bd1c67a6760f6ce4b8d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      29f20e385881f936f67337dfdbc013c0

      SHA1

      0c1dba8edbac6e8778397d85f13b0001fb1e4609

      SHA256

      552b113e8abcc0ef8c6501cad2b38a9ed379262b8e7dc585aa9d856b8055219c

      SHA512

      487a2b29a8e85e911661609e2952f9b08754e5322895eeb0a35d18dd0568cac2c2941a6d56b216dc7bb1e015e0d17f54f05d90cd9bbad17284566aa36a117ff0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      02659216e6b359b5500dda37532b583e

      SHA1

      5d32be2374869bfb16535d05ac42aaa9a6057284

      SHA256

      bd94372e7e768a583036c5059bb44914abb2b731d85a1ef23001a2fcebfe84d7

      SHA512

      07c269dd8828ec17d33c54f6ca6fbd71e383d4f053b9f0ef71dfda466a65bb91148c22cd951b4ce77d8092d9211c6d33cc2b6983de342ef390f88410c5f8ba40

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f3b4cb186750d603e2dc44557fb6b4ec

      SHA1

      6edadc7469bea3e568456077272f3081ff0524b3

      SHA256

      26ac669582705f18b51653f5b6a3a8ca65727fb21f3dcf2afddb4917291adc3d

      SHA512

      ed9ef4713fc22496130164b1994e544c6f4a1ab7ecdfe0f67ead7e3858ccc7deb5007cdda5b0905206e60612a44eb9243aeaacf3b131299e4a4462e0b3579742

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e79e2ad4d522fc28d793b9296ed858ab

      SHA1

      045ca5c5cf74a9f4590218e1a0093731e3370c31

      SHA256

      7b960bd9b5489c8b7cc7d0c2350dd8535ad00ffeb0006afb27337eaeaa5e5cdf

      SHA512

      80d813a2e61aea4def22c013d96a43af2abef2db56b4314b78a7efaf10ff3070aa5b22445d1f5b7273ed879760f9d186815a1043d69878675fefe29c75cf9c36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      94bf523e2f78d0e82f7b8d26d1ee34f4

      SHA1

      5d506713b9974d0f4c53a92b70fe51562f228e74

      SHA256

      259e658cdd07355d14ad082d273b01cd00e6611995300eb468badab14fa634c0

      SHA512

      f482e086241bb3eefde7de11ba313f93ce80a2536432fcb007430c80571d28d9c5f7c5bc0fa3f45a10d0ef1cb34a0ded948b97effd7b28f7b9c6a0a914aeb78f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4c62a8569a08fe6aaddf78554b6a8402

      SHA1

      5972fe4b619c1a3a16b9b52fa9157b94a2ca7c14

      SHA256

      4a2a495a283048f02f273a71291633115187259c5ade511064c80d5558fb1cfd

      SHA512

      418d6ce4d8a025e35e0c6c099b17715952a8e66d8080f18e113aaeb84660052cc70bdb105e3243eaa2eb65d8ae34c28df905e98ed8b7e077d87a432010863475

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8c30fad47cc66c9c86883daf6d1d418f

      SHA1

      14a416ed94065ad788df8ca17f2518420ba98be2

      SHA256

      9e59af9ccc18e7f2a5ab95b0395e14341a348f664a93b4c21e73fe0091cbf336

      SHA512

      82706819fdaf5a17cf6746e4362163549cd1f0e42dc35db9d552c9ed653d1bd93c23ba8eb8836cead28c6eaeb18c5532ab954e403149b1a9d1979f7ad87c0a6f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      abc8b2f6bfb8fd99de1a6d432343bbc3

      SHA1

      301d84c686fa353d46247ce88dec5979b312cdbc

      SHA256

      d757db9f37351afe7d0a7d65b9307c46b6fb63ad2e92f95e657501fa10371038

      SHA512

      b547ae3fd4fe76175f8a8a44744f1bcf8b22c3e383bda463af36844c55767357f03352d11d01ff72fe8827b96f7138a41271c1148fa71487422df043820c4466

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6478017b3b38c9bc94899b05a74c5b0d

      SHA1

      738510a24c6db5f985177b9d09b42b3bbb147228

      SHA256

      3afe0176dcc25f9f14c37d485bd98d540d00f9be775f80540c85565694c26b81

      SHA512

      be375304e24d2c7a9b71d10d4c123aac7626ef66c682815597e308a0f6361df43d1cf5d22a53eb04c06c4646c23b1890b9ac101c0a572dacc1304a301f1679b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      9a202fc0030814ed9f89b7b22c6a7554

      SHA1

      47ae483988ec471ed210f37d89fad0ccc477a466

      SHA256

      b7c16676b0d76ac44744c051adddb3d98d1870bdc66a3ac3559e436f37219a59

      SHA512

      e83e14d5050540e7114306c6f4088acdbf1ef622b4de37fc1b7ffd0a33c21065530fe171bd464578477cae16607d84d9590e69c757db60d57e34162411f57695

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      59aa3a52558aa08ceb00cc0acb30ced5

      SHA1

      f1a75e838c2cd7ea50ccc8e173f331c44e19dc49

      SHA256

      660ff4ca2c2e8103bfcae055810413d486a406d2ccd35ce99a850f39cabb1e0d

      SHA512

      1b11be8cacf69119c722a00e0d779d13b03708ef7ad4095c740aaf2ce651cf828a6216199538d35ca7ef9b65f4b86711b54d0b7ad8eaa3799b2f5783c99c0030

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5373b22858590593c5670942ec129f8d

      SHA1

      8b6e1b21bd266e7e53e2f6d93a33aa478310fdcc

      SHA256

      922f118347457f29a65b430840c290d40749b2f137e6abd66885bdeabc722c23

      SHA512

      aad981ef3da836650638db7803dfcbf88a514a2dedb09e84141a3503e889bac2118fa692ae42d49b64edad49888c279849340481edd1629f1e0cb69ef102e053

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ba085100ec166bfa701f0d88227a8b0b

      SHA1

      27b9e0f27b5a9ad5f0719b8ab444dcc21068768d

      SHA256

      66018f778854efaf9cb57753e3f0d5e9ef29c4e3bcae211a5c33028d4b22e88d

      SHA512

      499ecb4070588ad00c9e2098883690566abf0b075ef24dbfa1b7ee77ba862ba8a03b73106935eabbe774df4d18f1f642e33c4da6ab64e956e695c4fbf8daaeb3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ae967bb3b73c4cc906575848bd620d56

      SHA1

      79350ed1d4a27e834d23fef7c65d6c60b4a14b0e

      SHA256

      73acb855dbda95bfab5268b02fd584db5785afa19c801e253b31b4c3bda743ad

      SHA512

      d8e69e5a468e3ffce048cdebe0b232024c44f48463599e03f505259d202e9bfdc1e384f9afbe3b9979f90d7c8b929210ec801dff069a87937222b375455ad0a6

    • C:\Users\Admin\AppData\Local\Temp\Cab320B.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar32ED.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2436-22-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2436-23-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2436-25-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2616-10-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2616-13-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2616-12-0x00000000001C0000-0x00000000001CF000-memory.dmp
      Filesize

      60KB

    • memory/2616-18-0x00000000001D0000-0x00000000001FE000-memory.dmp
      Filesize

      184KB