Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 16:48

General

  • Target

    79cbbec404005315c715de8da9c58ea7_JaffaCakes118.html

  • Size

    150KB

  • MD5

    79cbbec404005315c715de8da9c58ea7

  • SHA1

    0b3cbeac116fbb74c11ba0c08737a831e2791fa3

  • SHA256

    013261f23c718c26af3bf93269e06366f1a4d0bb37563094f35094485df635eb

  • SHA512

    824adda1e323f266c7caa1273c94e5968fb57b8e9f60d059312c35887d530f52665b901cfa2c33e68d337c8d8c122e5675bc374e92ffe7c8dbb113d29b11b4c6

  • SSDEEP

    1536:ifRTA877a1FgYyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:ixGgYyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\79cbbec404005315c715de8da9c58ea7_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1456
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:904
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2284
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:603148 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4fbe62117faecffcb5ac8f20f58567a3

      SHA1

      e1bf84f37806d8e2465a3d735ee173b81125136b

      SHA256

      0f317f283ac10ae1b32218a4c355f4ba6821bcd50da1bb7a9eed6e3612fa5c2c

      SHA512

      e753cdf6df15b3d3e6af29f13b14afc654c7658b38e72aae2e04e341a22101999e4fcb9175e83b685bd8980812f8229b74588daab2582a88768b7d324bae30b6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a233dcb6287d9373dbda96da0b0f21d9

      SHA1

      c9ebc0833782c4f3ab1a5aca6fd50cbd2bd32783

      SHA256

      38d75ced5d107edb51ebcbace42ef79b9b9124231bb70a6e2da286d341b97ad8

      SHA512

      0311b270ff8b6caf26281b56f4179bfe9fcfb3fe0605134035ccf9eabfc6554e0169ea83aad2f8146efc26c0dda996ddc974b8da96c3f69f1b1a6636fc8a624a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e0a60b557f92cd418c96aa9bbe7b7c2b

      SHA1

      8381588801e8596af801b0e9e7f53c04729a26f6

      SHA256

      6b0491895232f08432a0277c00f7e449d4458d20bdbc628bdc81db97f5de0715

      SHA512

      6a78c0c38837ad5d7ec4eff331087f5cfc693215fd40db68f9fd6b4c497cb1e75d0004dab83cd41f4303b209920a31728016742c071f9acebdddf13ceadc2248

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      48b1bf9e7486c4bb20788b7c689f4f31

      SHA1

      84696e16c39b4ce8c24d05546f43a52a6e29fb4f

      SHA256

      48e5e7d1a89d098c5f0d6b12894267b3c606561b78a97d210f34519e62febb1e

      SHA512

      4f28b94c8496655f28bdef78a862991162c5776f9dca023d68f9ebea0bf344a9505bb5f40fa7465587d1e86cd2d3bafd3d4f4e187450528621684dfb76dfb67a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      34bdaa6f89a979a45e2510ad6f3f83df

      SHA1

      12c2220a089eb2ef29280f9f26b21081de072057

      SHA256

      a9b696d42a658e25e8fe058c18519c6d4a68d7a5daa976ff2dc6c4d2a30fbe56

      SHA512

      c0dde4c4c26f07b3d3c48d106d0222ee45f379158dafdbaa6e4f708d2f0e997fb48301bf131f5d8c57fb445b1eb71f920b3141a2dce645a2d9e733efba5b87c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9c6cd5c6b955875ec5a1e82449589272

      SHA1

      151c09fafa917d9de870702a1f164a6f68153aed

      SHA256

      1357f6c3f5235255cc984d3fd3ee116583dfbc1c205fe3e54507f76eb99fc3cc

      SHA512

      0d7c4e7e8c5587f9e6f74eef0a130fd393a77d6e1cd1a31cf4f73d146c49674be1068d6e413e4ee76f52abdb405b773c6fbf191e1dd95778fdc701671906c910

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      89e5578a9eac3935c4a3111654483b6c

      SHA1

      702f0dd8788c624d90fa513fe1b1ed0f17c81441

      SHA256

      c5d5fe2347019130ef31ac29d9ab67aa345dd210eb3cf9c73570978a78ca3b2f

      SHA512

      b82c534e72599e34ae26a060757ce19813c0623e2821ab8a73a2df055743834fe7144c3cae48cd8516fa00fd4dd56ae3e98b38ddeb5213410289a32e4621ee00

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d49d54da9d4862ae1da963a9f495623c

      SHA1

      8b324f6a0481a4321e2fc8bf16ef25df85e3f0ab

      SHA256

      c86f6932045623ba6d5c70bb4b54f4adb21d5263bfb51305ff5b7d6689855f3d

      SHA512

      2cd9c3f0458e02f1c42036852f1853cbeb1c190906cd412fdc6fdd4ebff0ed6ff39fcbe106ff5b7397ed64883a4118b04b4aaa78cff7ae190468cad5bd3ecae4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3bd692dd28ffab787b030858d1d7f86f

      SHA1

      5fefdeade1b33ea413284fea098be420f6662f42

      SHA256

      1fca441143cf1cfb5cfc0270bffcf5d522607a9df98617fb8a4a4cb8b62f349e

      SHA512

      8c610a95fa78f418369eb197209f526a1984ccb59b449147f6256a55570a62d60b8b0ca856bc44318928bad89e0ccd09b065df6f2f3fa2207a0d28218516c7cc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6023841fd94244b6f5152ee6a7f197c3

      SHA1

      91502e9228a6477ad588e4c51cc81815d4d9cf03

      SHA256

      e1c4013a014d4b88727690eb7ccacec99654150f1e30dffc2be595c035d24d69

      SHA512

      5fb5816a1028e2f911b88d486faa915d0bb3d1bebf08586d55b8e891be100fb855113c1d72b4d68778220b91158f8a60dfe34f3b11d366281a0c1f55cf9b1b24

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4face282f64649919588fb22a8af2905

      SHA1

      30bcf599da6014b5cc389d9257baf34a27c9d7aa

      SHA256

      e47fdc73933ab7043500523f2ec6e91af7c92444d07fbb0f0745c4ddd5498ad0

      SHA512

      4127ddff0c7fb306b0389c241713ba4253e88b196921a34e39b9a38d3787b0316786199986ebf0fac2b880578e3971e31b4dd3fb2a2af806a69dffbd264b5ddc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6dab07b034e03d7cafd5dea1ad54edfb

      SHA1

      1abeee80544ea5c2bccb1a6de54a647e74ca9303

      SHA256

      a71472462139b0b8e840fdb1d988bb0e441c4dc96f4762c462a61a63cb19b49b

      SHA512

      f8b73a2fa557ad2dc10a81720719aff48f58f9b9d6c56be58e42d56f72605d0f0247aa36926140d4bf0dc20309156a410d26947e372e23ef8256af45aa82bfb4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      52daa9f667af694c7c332fad17bf11b5

      SHA1

      bfd65482e809246e2e70660b237d85468a81ef92

      SHA256

      1ed7056aaad97ba7f4de26322fd1df2a021dfac18d3dfdc948184f55a78ecf4c

      SHA512

      988fdfe63eea465935af3578861cf35635857b5842f595271a376ec8db23d5a4080eb167eca75854ee342b8b10590d4f02d21093f0cf58c5bdac66e55d5b538e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fd7248227160c8d06e0718845a4dfe57

      SHA1

      7994c18065d335aa9f8748dca730986dc2852136

      SHA256

      70ee98f6dd952dd98746094b0017414a61a19b160b01969bd56009f26a90fe5e

      SHA512

      c65b0b468a83333d3fde6223c86c424fb0fe3301b13e5e7ffb46355d512b4b497963c6b71a2eba32b022bb38a10b1f82a1ec5b6726244e1a3d64ea7fa8bd9ec7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a7cc8a511b9be07703000e9322cd7d85

      SHA1

      d810a568c5e5fcb19f0a4ba3d7a96136b4549a41

      SHA256

      c5824432ab1250f5389ef296f9c28f47ab2dd1cf40166f7f8ad90ad71603de7e

      SHA512

      fd74d7ea3d0e591e32952e45dcd6c868fcf0d7f39f2b4940949593c9f341961d8365acfc20fadd48948e9e0d4ea44713c3895ef5e9d8416cad037d973679a6c0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fc54248b12cb5614cf019f15029b9357

      SHA1

      2a4cfe3a9c2679f8dcd150953a7a4aca883be6c1

      SHA256

      12364f37ed35d3792e143dd7a3c099e0afba147f27dc5a09085ccd4ebd5062a0

      SHA512

      a6375ef76662e51d906ed493b4695f447b3e07ecf09fb78d9c49b09ea6a84d3e56f0f00917ae6c1f078987d7f1e3633a0096502da670f5101b0696a5591e5461

    • C:\Users\Admin\AppData\Local\Temp\Cab12A8.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar13B9.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/904-495-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/904-492-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/904-493-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/904-490-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1456-482-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1456-483-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1456-486-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB