Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 09:34

General

  • Target

    78b1495296c3669431259a04426e73e6_JaffaCakes118.html

  • Size

    238KB

  • MD5

    78b1495296c3669431259a04426e73e6

  • SHA1

    a3e8977624a36fa54adb128de67eef98c371535d

  • SHA256

    c64d7e010c9c6f8088ec1b32f974b91721e98658a93c88a5b09931f285e70b53

  • SHA512

    7ccc7d6c77d065b0bc5be38025df7d37333a9493a6d2a4a45826f8875786cd221d5d5e52f7e7292ff105e5fb884137febbef359a411263f48cce5194442b6002

  • SSDEEP

    3072:S/csyfkMY+BES09JXAnyrZalI+YFyfkMY+BES09JXAnyrZalI+YQ:S0RsMYod+X3oI+YwsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78b1495296c3669431259a04426e73e6_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1068 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1600
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1948
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1512
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:1060
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1068 CREDAT:406539 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1620
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1068 CREDAT:6042627 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2392

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
        Filesize

        914B

        MD5

        e4a68ac854ac5242460afd72481b2a44

        SHA1

        df3c24f9bfd666761b268073fe06d1cc8d4f82a4

        SHA256

        cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

        SHA512

        5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
        Filesize

        1KB

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
        Filesize

        252B

        MD5

        92e2a18d96deab2e39844205bf299117

        SHA1

        64a6f82f4768cb2b441073491b0f53e548387eac

        SHA256

        654a8bc93fd6c9f0799c23e1d0159318f8fb493c927703574a3ca923c951ae02

        SHA512

        90415786d81084d3cbafcf4c4ee6a0d896a1a6ba6747989d0af1cec51f3d44d8e120aa21309700ff2adca1a02f82bd5f736f450f5dfcd9568bb5545e84d91c9d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        76ecfa8c35080386a33aee32e34cd7f9

        SHA1

        528ec323ac138704baf96c90d7f96c3c5419b054

        SHA256

        a5ba300322a5ee664c565a73dbc815424e3663425f493f742d6f379729e64687

        SHA512

        ce6c405b758ef522d150ecdc5479fab6a0b8bc0ebdf51979b06b613bee771b36c7b95554d1819c6e0a1e4dd294a794827b2a1d38925dc0abd54686437480e28a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        34f93da784fcc2b1e9ed199b089e3a1f

        SHA1

        ac5e798537dbb46a732fbb0617acb6e25457e9e9

        SHA256

        b20b5ab81f0dacc5f98226dbb9bd64a32ae93484a7aad1ac53b8574f4212501e

        SHA512

        721d5da276a9dd8cd55ae3c363554aa0125e99c7ca8e150e708f5d4402f43653e087760e313e768e7c4a493d7abf2b873176726b041a025dedb517ccf76359ef

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        99af0a0efe4d96bf6792708a0d10af55

        SHA1

        5a054325f6519f54955b863dd225b2580d39d21e

        SHA256

        92f811fc5852d5a732c0717b894668a0d2380896ad3cc46335c875186795ec89

        SHA512

        e52e6630642baa9c30075354646f58b81d79954b15e76f9faa1de9dd308cbefe2aecd83a8265497e34a16786fc941cdcc723d3c766ac5adf780eaa8bb6f5953f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        9448d91241bc9514ccac9be5973ba8c1

        SHA1

        3e13b8158ae1162b7ca96134d5dfa980b92b61bb

        SHA256

        cfa309c282ffa7587f5b7a7e9becc8316057f5d8136d7d7b85c4fb3741b82c2d

        SHA512

        f35dabd6a7c15df788e14fe3f9ab98e30876cb941e9a00dee77d7aaac637066526b9490309f3aeda7e35ca486f2de504fd02649cb77e5d15b65a940023004116

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        b9aa62a1cd2f1a6d81aadd293734be89

        SHA1

        56ef4d74682b4fe8d829e490846f7d50ca5736ed

        SHA256

        d0fbff2729e464c0f9d60ac761c6dbc9fb619aa9828172db169a804acb0d8e96

        SHA512

        c9b3b45cb55b99060cdf21043a2b61ead0a92a08f8ec2a05e441c003e15a00c88be6d71416c26333b4391ea87ef412e651de7786dd2b84d4f3fdeb34efa783d4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        5a273b2332a9428aa70eec80c3c6681a

        SHA1

        a0f5f5db6f8c57abb618a3aaa1f58e7dc7a87aef

        SHA256

        2d12747dbc7f3df01592f839de6b399736ceecc753aa58a56dfa07abbb620a53

        SHA512

        ddbdfaa341686d3c5ab8eb43c62c0f1553b4bc419055bfe5f55f12240fd3ff958b2febfc8714f0c502b0edb17bb1f3a7c48922d052ea79025652d07c91d6394d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        0a4f018eb15fd57c7516366057073cb8

        SHA1

        c8c89d79d62354f20c9fa67f6106eaa76a157a3f

        SHA256

        0a39bafa2b469e7e1b1e3bca46ee7e96bbe85362e095849f778faa010f425d62

        SHA512

        528215c35781ba7cd89e01bbc736010c94c94fa6938f97587260016453ecfd9e00619b0c38d48f52602a6880fad9dcba526c9b0be35f87a020b98888e06093f1

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        ce889c666e0bb23f215fb307947f20ef

        SHA1

        e4f4e727cdc6f20f02d488890ea9085226f476cb

        SHA256

        9e4af13addb768e9d2f5395bb9b9e0ddcbe08d7c1245d021061b1181375a9462

        SHA512

        8dbfa7090ab03229c68130141984679019492b5b208378df6214937d4ad9da81dea68d6e943cfe7ad5bafdd3eb8f0f5d43732a35fe46cb65a68172941f581bc7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        57ec805ca52be3b7f4de8591d1833582

        SHA1

        c8524ba219d7d037cc56f23b42ebc3eac734fbb1

        SHA256

        1e189ae8e2d907182cffc3ef317b559f154fe4ce8d46598c11628d95dee242d2

        SHA512

        ddff29b5fadad07b0d6f755f27d81f4cc9ac275bc49eaddc35053901e498bfbd5cc5f7108584a8d605eb4ea978691767b2c83e9e7cabce28ee8a3163a903defd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        8e89591dc490d61787c68a3bfaecf234

        SHA1

        7de9c23a3f6bbad107eece3e0cb6b012869b9396

        SHA256

        31709ce32dc4ac97afd96ffebb2a3fa7763bef71cf6d8bd535af5670278c501d

        SHA512

        6e256cb9babf4b68faffa6ff89ace963e9ad5c01bf87595231c0b9e6f30380a506ac34c5d9abf70128bb9e049b61f74080db031a5e7558473d9eb3c244db7616

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        69bf56a67a33a1cc817f8db26ef5469c

        SHA1

        b602d6e97693b582534c0f0bb86070abc9c1012a

        SHA256

        97b3383c3d082fc89383519894ac14b26da080ef2c3b884c630d72374da57e7b

        SHA512

        23f84de9be19cdbe4aa79dd53adc57f2deadcdc367817fa25ffa3318ab250e4216585da9c8f0da0306e592f2b8006d29aca5db754dae153308338733d278a4f1

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        e32bdbeb1b306f276a823c73b77b1a79

        SHA1

        e09165bfe64d0a34c03de63989a69affc5ea90a5

        SHA256

        3ec9b7e825b80f09b72bb423f008e8b17e10237fccbe5ef55a000ef2c10fa4de

        SHA512

        31fc6dbd197957a6b2f77e2f577f15aa9bb21a725202c6a4987fb59ceb93461a90e91f03a623f1531ec22553363ce1bf1b167d48f646c93cda349d8a26d84aa8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        7803b81ec4942ceed64d7a52f53e803e

        SHA1

        03043f7d005470099ee903670e9738ff23124a50

        SHA256

        b626697a2627f25a17a47e37973d5ddfb1591ea4dd3746470961dce399b45772

        SHA512

        f7cc38866bb4c1a3bf5e9e13e3441b69e4a553a2bbfa414984952db08f410e9de69b074ded17602f41d62b2e77d947e1006ff19703a61c57b3dc09b372758e29

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        0ca5978be012a4bc57169f6f98c12d03

        SHA1

        b650edda3604c5e73b005f8d91a7bce2ab38de2c

        SHA256

        1c6361c2678b4840ced7e0f107858a8fae29c3bd5d909ad4d9afb5c656714b17

        SHA512

        41da9b888439c11d57bb0505c9d6d3e23556395d79c760724a2b508500c7987da9f00ae32b29f60cf8a7ea23c6e9a357dcc5e647aec410323f40580f8e96a628

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        3f140f2e85b5a05ac2b736c05b1ad4b8

        SHA1

        f2e1c6459705696cc2392b8e0b44930d70193e44

        SHA256

        5c4abebb95fc1816095bd60fed202f9f721396c4b4bb5628799e0dc39fddd6c2

        SHA512

        c973646191e92bf7a014918f2dd1b73412adbfd752509d393bc5f45ebc49598e5b6fdde6d7aae57fc056d2140f94d0b4c84fd2bad654f698a80045169c4ffb69

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        4982f4791980596edabc51a042649dfc

        SHA1

        a3b2b08e951120e1aaafa1246cf0cf029b572dc7

        SHA256

        aecc76590d0ba5d9552ef883f307333b2fe5bef5a84576c4a4737c806e5f8023

        SHA512

        32d0b7e8f1b3278341e112f1c7a93e4002fe5a45739839d52be5a44164c50e6e6728c34727e9927fa604e4c6064517d463c15c801e6b02fa1b8481d27fa91991

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        cc033a8e0a94631036b92a2af275d9ac

        SHA1

        3de366a7a10e35c500687c3c1c79069c1e312b8f

        SHA256

        321fbc80032a10f558844dcdf7c197a6d20153ed8eb62fe2b8770395afef6bd0

        SHA512

        bff9d728d530598142b67bdf1e9597e8ca878d026f2cd166a5403862439af9b1cebe870ba69f56762c35b34473e103f5cd56bee320f2fb3a85247c0d1a5d5537

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        73f7306869e4b737ff0b32f50d5cffc9

        SHA1

        247afec760e84af90946d1b199cf55a14da16c6b

        SHA256

        e56666e362eaee68d9a7e76d3422cb4ec15b330963a97f4bdf86b8fb63413c5a

        SHA512

        2facfcdcd245122728cdf9783a07d83392708a8b99b41acd8b343d5ef2a5b93c3f87b2c49a6cadbbdb2b951d0915e22bb85731954c71b09a0531a7e1047173aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        35f961b88803dd7bc949cade539cb689

        SHA1

        06fa05891c5ad3ba1c6968b12036c541ac1b8ec0

        SHA256

        fec1ecc56761a1f03274a0bcf5840cc871f02f528940b916c98ba999eb7ee9f9

        SHA512

        87ec0bcb114e4afd42ad897914a6613dad2f4436907b12bd1ac96a45b5334e7719bc1dbd64e77d704ba19cb4fffb58a54f7c0b6ce934210a51f5cb77bcbf4f98

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
        Filesize

        242B

        MD5

        2504ed08fdadbdc7850062f3e6830874

        SHA1

        5a1d08fdf4a60d9a24188f194eff75a36d476b42

        SHA256

        eba0190a6ff0a20fba8a4c10dd25d38b0cd2268aec73fa6d18e5aa6a86c0ddd8

        SHA512

        f365230b218e6a2b27c2fa11d94dd3f4439795d8a8895d35da1e26c6109250d0c4f9cc102ac20c06becd4595e914edd113f580c151622612eb630009d4249aaf

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UMI32Q2L\favicon[1].ico
        Filesize

        4KB

        MD5

        da597791be3b6e732f0bc8b20e38ee62

        SHA1

        1125c45d285c360542027d7554a5c442288974de

        SHA256

        5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

        SHA512

        d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

      • C:\Users\Admin\AppData\Local\Temp\TarDBF3.tmp
        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5C02I599.txt
        Filesize

        88B

        MD5

        0d983fb038cf0a1c99a118db99a409b0

        SHA1

        6e5434ced5a4f8f39001933a2ef586c1c0a84413

        SHA256

        3a82480191a6b324b7160f9f69afcf33ca6d5516a619a356856828adfd5539d9

        SHA512

        aae884d29b10fae53b98ceb61f2c7634558257642fc89056e373b09fd93bf68e7e6172f83511922d3cd6b897d1245489d66676fc2001e8fe23326a97eee7a648

      • \Users\Admin\AppData\Local\Temp\svchost.exe
        Filesize

        55KB

        MD5

        ff5e1f27193ce51eec318714ef038bef

        SHA1

        b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

        SHA256

        fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

        SHA512

        c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

      • memory/1512-21-0x0000000000400000-0x000000000042E000-memory.dmp
        Filesize

        184KB

      • memory/1512-19-0x0000000000240000-0x0000000000241000-memory.dmp
        Filesize

        4KB

      • memory/1600-16-0x0000000000400000-0x000000000042E000-memory.dmp
        Filesize

        184KB

      • memory/1600-25-0x0000000000400000-0x000000000042E000-memory.dmp
        Filesize

        184KB

      • memory/2944-9-0x0000000000400000-0x000000000042E000-memory.dmp
        Filesize

        184KB

      • memory/2944-10-0x0000000000230000-0x000000000023F000-memory.dmp
        Filesize

        60KB