Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 14:51

General

  • Target

    79788a9ed41b8afc85ab89bcb5fd3dac_JaffaCakes118.html

  • Size

    157KB

  • MD5

    79788a9ed41b8afc85ab89bcb5fd3dac

  • SHA1

    81617cdcc401b29d53cb75b20c52778031490933

  • SHA256

    028a5854549133371ee12253a4b0f9e848e022703aa8ff1c2925594b3123bc5e

  • SHA512

    144f196f77b2117edd7847485bc063d79c132ccabab18969e8e1dbf0536e8defc55001d9d2bac8983f29fa7b8bbce11adf3a108f4bb53bcf40577fb0c2e0c59b

  • SSDEEP

    3072:iwRQZzBTEyfkMY+BES09JXAnyrZalI+YQ:iVzBTJsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\79788a9ed41b8afc85ab89bcb5fd3dac_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1476
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1600
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2852
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:406544 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2128

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ce6446a0bd87361bd1d5128267483535

      SHA1

      52752bb3a79ad75013780669d1fac1e0754dbec9

      SHA256

      2b6a3de66c95688d5eb29a68a48c9400881583cde70eb0fbf8f3f741325509b7

      SHA512

      66ac1c1f80b516c96f1999b5809d198072f0f6b96d597999d35a09abaf3ad847cef21868fd42ccb757d366e8be1aaee4c7dab77be9c398fcf64e7a3defc1b83a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      128a2a08269a31e954194164fa434cde

      SHA1

      a0cb9dc9786691d45092ae26e5e945269dc27bf2

      SHA256

      7c3b3732018908139938c3e5cb6f34f29bcfcd2248e130dd87c47491acd5c826

      SHA512

      f4359a376d4325a541cc1cd1eeb4bf873e3bc914aa848da705730350e9a503220148f7d7cf57c3c1b1a77e639d60e9ea1ac4b1ca55fcbd1cca87339ffa0f8f4e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      52ab7638ad184ebcae75e233c9927e9b

      SHA1

      3086acaacc809b4c94cafa4fd5634e5071fda503

      SHA256

      99d05e0d1cf992802097b75cdaaadddd52c82d155a39a5964e370dea726be63e

      SHA512

      e0f9f87ba472c57d1cd8ce3b1d6f127b5dea762b3ab5d6ad4fb7835037bf51fbed967223cb1b138e29253649b2a6722cbd51f27d31f921ea3f1033222d813479

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e39d71ea48bccbfe8d609c7b45fbd162

      SHA1

      1595bb2b1ae490985651b7ab8ded15daf1340d39

      SHA256

      9de5435c3fb5efe61052b23888c5e1ff2a049e3a4df2896cd267aea4e38d4df4

      SHA512

      49960ef276c5325fb280b8c4a21d7319385ab25c7a2d68bd22855d681417da93a60fe7d3195405f84c84a1a667f4d2a6b268104bde636ca4fd94306f7352769f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      33ea855bdab4a7c45b4d11207115f0e5

      SHA1

      ace6a1ca54e62c594c8a96915053432de6c30963

      SHA256

      583880753257d58270049ece51e632dadc89525730cd5714f65f2c7efc22f7ba

      SHA512

      c26a1503e2d92ec1861c22bce01ffed0b2f83126c4db901085e6178b92917f7ff171e519d048c366ff61cf1d1721273eab81d6ee1269dadf04e81a6d561fd61a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4aac626c11dd38715bdf28f5e75fc9b4

      SHA1

      bc662ea1140b1640c7c3ed580aa6cee671067e51

      SHA256

      84596b8936c2535d3b76412a4620f5abfc9cdc29926417624fe33bff3223eebd

      SHA512

      afe55116d43a812410ef76985ac7cff9ca46a585d4907877e3e5a5a3bb25b21010f2a39a754114bff46d0c19f8356c3a7af43d2c208b58016f7c67814936c952

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5e2c1588b2f627763ad0b5ed668929f6

      SHA1

      5361d6a3f63ba52da1f9a1633997dfa163758cc4

      SHA256

      e2c217c766b7c7a203faae7a70620323604af28155fdd27a15a081b82fa92b47

      SHA512

      69de912d5eae75560959ba7f05affe87c7789e71bca8fd45b03ae6199d98b938421f234dbea3fbf2b41e956b707829e6cab7f4a54ae13190474b74d54a7782ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2a9c27b3865bb9b52c5f2e7345936fa6

      SHA1

      9a623439d6475d8a8ebfec85d8493808da5f34df

      SHA256

      7c2e3f79a15a1d059701a25eae4b60a6093787b23a85e03628e47f1d999da6e4

      SHA512

      76c515bdc9a44eb0c30c8520325053e6f1a440f70747f2420a43cd339cecb75d70ed7d31bc8f8b6fa3eb97ad510c4c39e9e13df1c5c1ed54a2db3a1dae8f31bc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      61eb75fd6864260f731d3322d42116bb

      SHA1

      fc69271d21b5d96a73b461609b2c9971cf2cc410

      SHA256

      f4857839aadeb0aa0b38e6fe58aed2a21fea263d6e6511b94081b60926317e46

      SHA512

      d60d5d1df676293e40e5085f808e9f35e6f3ae90c14324b9928f653309c034f1b23590ec15925a92c7e55c6f114ad2c4b80486f79f60b742662d3a7bacc17bc6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a14e0a18b1c2956de7b5a57922a60e49

      SHA1

      dc7012bd784f74e5c04a0ad125844965c791fef6

      SHA256

      0fe866ce1caa942a6a13a761ac4af8dcb5ea16ec2474e96e2168a24c145202ac

      SHA512

      cc89a638268456e753dac83da39966c04e75d25007b27921fa89ae8eaecb0cb58ba6fff63a7ece1af08d9da202517506c3414e7a3aae5854193d3ab01c406514

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      dd3fe092df388e486edf7608d6a2096b

      SHA1

      6e960604d62106765294939746541580223678da

      SHA256

      6905c89fdb636a128c42e1f714311547c9358e3092ebd7db46b7b4d3b700e6c7

      SHA512

      6f270abb8f64350865a4d8ff6d79ec78f2242b4dba7010fa8d8b363b5a030903d4272bf17c3a74753b543b9646b40517aa1cfa466e21a0dc5248e8a0d5cc83df

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2398c418c8ae803c4ef152593d471041

      SHA1

      8e8fdc0a2b8ceba4a152652e2634cfcfc7a725f5

      SHA256

      99bb9788a24248cd885e99d293f67a5bbcd67ca75cd520063e6a394b5618a862

      SHA512

      a18eefca65bbe4e939a31940ca45ec75b8275647e8f77035eec473906ef7e454e60bd237ad5d3c8d3958e3aa7057b5dfa600d41fb3174a18baeee12fe5d258cf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      74674b16edf2909626e6d6a7e73bf510

      SHA1

      32acdf6358147e7f913d20550b59164b5934beb1

      SHA256

      97854e7a7ade05140eda90248771931fdcf4b1bef8bd7cfdc9bee20ef3f4f805

      SHA512

      ded3f4f7fb7362876e9edc257dc7141e5831e31cf5c2c86f0a6a315fd528526101ea495d7f51b96b4bf8b87e091e5843dd43c18acc85914a54521144b7b0e66b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      782c58dc6f79aa9e4d37bfa442ae794f

      SHA1

      14e3755121d467dd4987cd2bb071ca33dc2b642b

      SHA256

      a387c93fcf82ef2a7b3a594f57c3de89262ff15d92cca2c45723db5ac6e42b2c

      SHA512

      7635f82fad236481c72394ec6ec97f66bf742141dcfb567d8987ec2ee8f3af96f7a3eb7e9ed7099d431ca4201fcf5f29006057f02e0732e21ae0a86f5bd0dbdd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5ee53147a356c53846cb6d06b428af33

      SHA1

      96836fb3359d6e5cc07e3b694f51414e9572c8dd

      SHA256

      bfa063bb926c3f0b0c1b74dccf76d3f41afaecb04b388a17e7b6684f6ca9fc6c

      SHA512

      27fc09594016740123ddead84a5a6e0a26403018b440f56491267e4dd84ef77702d49a810c9efff829c05a0171cb6ef3354997e7ac7f03bfc1df919b1137d8b7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c2676a75367e784b9149ffdca3f49ed3

      SHA1

      2629d497080305a7815c382923db775ef30a8a17

      SHA256

      0f4b9a2247bc08f33eebbefc7db9723789414406b0f33d46429e508748323dc0

      SHA512

      7215281099dee6b0dac2e0a7bcc1d75dec5897be235558e9d4a4a814ea028f11c8023be8e5a443199c184be07d173ada1aa6d7aae02ff99b8df53772e898f93c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b7f3515909c2589b9cabb14f1222f07a

      SHA1

      001fd3961c3654e04f195f75c0597bc186a9ea90

      SHA256

      03e2b01336db732a3bdde0cbc4ee81ed830ba366819b259d0d87aff165e545b6

      SHA512

      523aa16c6487094a02c9e9dc9626ea2b4899c942cebfd3da60b1946872124947c7865bfd20b669059e7736a199ef18daf27251f49cf482526f5d125f1116c9bd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3989a68763e61c641eaa88c6752bc9ed

      SHA1

      6790ecc362001dc926b25cd7c7572ae9cb2fd7ce

      SHA256

      04b13f82609e47fe1b8c94aa7b45b8c74e174bcc4b7b6e865a470564981e25e0

      SHA512

      3b2ec23c17e6e92d37313e0336f53f295a2d029d7734db1cc7a68ce07d6e7c8d2b6a03bf65695930f3dcf54f8082b2198efe8d9d5dd2d8c00c325de903bc1f68

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5fa05defb750e470bbef9b5ea30f26cb

      SHA1

      ca4dd795dbb9a416c94bdb3a381eae01a1ac0bda

      SHA256

      6321329f079e80ab5f479c02877c192bff2d3db2f123a5b6ccfc7d9567588faf

      SHA512

      babbf0743e0d424fd2a3bf88f4b9d5f654a22ab59d865a7540dd1658e2938f4893953732a9a6babcd6321b57503016cb8fceb915b8bb86a5688897afad627e49

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      007fff59c56e1f998c2981cbb7a0d1af

      SHA1

      0a2928bf87332d19d53185b25c1609f9194ab747

      SHA256

      8e249b5841dffddcc94c37f7b1d2b7c911b51ec2f9b4eb5c8243eb2cd09dc123

      SHA512

      8624a046cb7bfbb0a11074483988aef7771406271f344cb45bd050ea72346998eef63062c9874018961964abb83289b386fb9dbac52062049fb296b9b6fc0ab3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2ad8a47c9148ce20c963c9ec842a40f5

      SHA1

      62a3dcb4ae2635ffed4a1f8262c612e62c65b03e

      SHA256

      e5daa3e66e4da630fdc03e9cf27b6371cd9a7f1c9cbf44e08fce2276245400a3

      SHA512

      b80d9796f1f7cb4d0bb419040091604f590f098d191b676fc4b8213f297c8526e2ca37a679638d447d2c3da45bd4f357be12e494c69a2441a9cd949fad61e6dd

    • C:\Users\Admin\AppData\Local\Temp\Cab87B.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar8DC.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1476-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1476-435-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1600-445-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1600-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1600-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB