Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 02:14

General

  • Target

    7f2f79681878051c7b58efd608c2d78f_JaffaCakes118.html

  • Size

    159KB

  • MD5

    7f2f79681878051c7b58efd608c2d78f

  • SHA1

    0b4376ac186d2a3adb9de93d74692abbe3c09101

  • SHA256

    b19bf79a386b88a6b362348b28682d999d1002743af5145d5af92e18b1a63fe4

  • SHA512

    1532901fc8363c6593378c6befffeb3f0c58457668c9965c0004e2377fd4a4f790fbffb218f9808a736ae1e79d4b0ac8fe5885866c87674fa674cbe78d263354

  • SSDEEP

    1536:iRRTQUgYK6CC4a9fyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:inQP68UfyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f2f79681878051c7b58efd608c2d78f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1404
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2708
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275467 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2124

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      672a7bfaf7416dd778fcd33a371b72d5

      SHA1

      6fe263ad6425a55f2031629dcc6158d6f6071f31

      SHA256

      59f6358133ba9b1beb19986c37a8b8f819232f87be8faff0bc82f55164a2cfde

      SHA512

      90bb45381638b23e2bd51d5d33c7600b07db2cb5feb2483768d4274fc2d7f1d3bd6656fb825dfa34dfc0f4e8ff373d98fa5746ffa7f4bf4e9fee4996d6135e25

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      457b6bdbd10b5968bf52f3faa886939c

      SHA1

      04850034fcc5e057f65b85b4d34926e9b394c9b0

      SHA256

      8dab9eefe46dd528275f0c3a830cc7770548dca4e5c3a1b775ac0ca2e0e670a7

      SHA512

      87fffee2598132abd6cbb1a826cb604f757179438e37da49d4a49eef1437a4ea320c882b2de1e6b003902fdd1194c3f8dc4442775c7e9c5c5116aacc81653fba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1f3241ad05aeffdc9806021096c35805

      SHA1

      d1aaffccdb788dd5a21a110fd2187353fa87589f

      SHA256

      889bfac7cb0dc7915ef1ffca9c21ba436c23992b74a81b771625dcf7349f56d9

      SHA512

      b96fd020995c4282a597be708290171e22feae3bf706ebafcbca14c6fa941b1bd26b2f7144a9f8037530da072cd0c5fc52718d5cd644cab10451759327e3f01e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7af72611dfd6937f34e4df5e4e54e05a

      SHA1

      f4c1a0186c3a689b7b3c26fb87f2fd0438d9ff98

      SHA256

      455fbe0102e700243f0a4f9748408748568047d4e33ff03ee5e73f910097ed1c

      SHA512

      f6fc235bac66b623ce3f513741bd51e40c61c09a58b46e9b3a3830af62db5d369be3613f5490c4e9d6f7320e997ddebed11b04e232e6e11b903042fd74e01035

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      15055530c0cd0520ec4e7e21c8b04f23

      SHA1

      c978444092ac963160410da09ae7fef197357859

      SHA256

      bd398d29582b673235fa17e980ac01f57a52f096f7b5e305b7b36f61832cac57

      SHA512

      3a48edd90857e11a522e16c508a9f6e35ef68237111bdbd61e62f4547b6e296f04541c0435f17e7327ec70d3b93f08592537fbc03477ac9bc0b76b648ca92b8d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      56b1ede73d0e70a876f212051a06405d

      SHA1

      f4dbd6e182312c65b40f58d69c2a9b22c1dbad1e

      SHA256

      89178c3ec65b77c26e6d768b55e898fc70c72150ef26085715fc6a16db6efec6

      SHA512

      2956c8b94d858d970aee714ff9f90331d3dcb448b0aeded37364734ba378934cdc094f263ac83812ab4094781bc3cf15fabe40541da217b05f6863129791ebfd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      87562575f3c7a8ab8a5a2ba387605504

      SHA1

      aa30113374b90d13870cff40da8708d52c693820

      SHA256

      6b3a56b3191825e85882cdd498e2a1b1b9868c2c9c371af0c315d3ae179a8544

      SHA512

      25dc1018ab9037efa6380362336c3b3e1558fc52c1b26031212428f28e79d2d1fb7cc614eb082ac1d11c9b90bd3b6c4745f2413b3866dc58ec458644fe0b27a9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      da304d2592993b1ace64d8752c729500

      SHA1

      d1285cd08fd3ca026a060efd3fe5efa704136afb

      SHA256

      bffb5ed4191122a11c64f871ba78ff787be8e47e2cd00612dc665e6c87593925

      SHA512

      a333ff5f969905515518eeef7595a01a58b769ede70d5fa4d0d81174d548fa090b218141518eb315a4a9ffebe5c90ccd1671441e2e893f36e95f7b0df7c5faf9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      092b1e14d7410268c546108eeb3ed5c0

      SHA1

      51eb1e3371c88ad075ca7839a4a07ac499647737

      SHA256

      f13fb35c7bef11dd2d2a05c10b9ca3a5fc3849f04567e0a565e15ef55ece8051

      SHA512

      3de60d583bcd52daac5a5edecd9f3de830bd866157c7bdb9dd1c274d3aff735e7732b5bcea07687d7a122a56828e754d0f5f5fd4ac9f6afed117a83cf74f4fbb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ce911b9b653c0d521e6119fed1dd8c5d

      SHA1

      c202499679bcfa5be2bbbb50f4ba967dd01e1d3f

      SHA256

      7475bd7ba6ed33f5875b71d686b3eed6ba980da1be604aa64338a6d0fee7b96f

      SHA512

      e9f3a2411253d0f8b3f803712c81bb616c15105df37d92c54a35e9e0db0031234a50289172947326e237d3e1a6d02a78f560ebe52ea75b71e874175a427e2841

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c76d324836eeacd40041f78d8550fee6

      SHA1

      5e8d2e3eabdb903644483113ec868b4327fd3374

      SHA256

      772263e25c5aa00c5d2938f30d1ee96de74c98dc949459ada1b207e3d03f9c8b

      SHA512

      f416446bf8ed910d25c070879761c759d36dbb9e85df6d22e5dcae69f16d46275c22ae260f1f6f9d1e531c7572b938da95ecb4f3c955b44ff93ca33f4b9c34d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      14bb640df1e5668b94ad104b3236ecb3

      SHA1

      e8f6d308e8626ca5f8fed54b833edf9f7ad532a0

      SHA256

      c768bf1b34df257662bd8163b4c49265b230cfabe4361a68cf56caf8c617a32c

      SHA512

      cc87fd489911fe54f57acb416bfb2a5981321e4e969ded47e221a145df61805b55e7e923951f6cba60b7da1df040f0b6570f8e0d1614f282a5e2428bc1ad5608

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cad56d1bc640bab0885b69c222e3c2dd

      SHA1

      c931d5f468c27afde105386e6400b8787a45f682

      SHA256

      2358a017385cf928b222894287d6f29bc2b82e36b10d29c98b2fc9df35e3ce12

      SHA512

      6802c1341b06be84845a0100e7f89052f9463e3248e641694118def92af105edb6e7cad507628de57b2b26bd6d68f14e340023b2e8d6abd545455dbcf900d746

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1fba66b13219cde35a62f3a4373fbe3f

      SHA1

      fdebe243848b60294a34357d270693a21b70224d

      SHA256

      332e16fa92e2a74acf86a67705256f43bb13a069e0cfa3d4ff02e20403b5f4f9

      SHA512

      33d22fb9316904c1a34b5455eafaa014330a5f85be2f3a86875f2f7f601a3d970008c504f4771b70ca2d045eab9ca76bda75beddb0046ac12c6369712b112596

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      21ec721e7ce74b838b6fc95dab46cbc0

      SHA1

      6598c6fd2edccd05f3da7d7d6128dd9fae8a9d3a

      SHA256

      411160c80bcb3b059ad60e51931ba15f4c4c2032842eb9c088a1c55d879bfb76

      SHA512

      a2f2c807ba193e7179accb6234133e25883250acaab45289a820f511758534b4463d19e89789f4205762dddd6b8c5c3991c36f78485ba4d53095a40d569fd28d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2a3a2a68fa53e9aab21d614423ebe983

      SHA1

      51799e421a2cd4d43bb0e7f4bff28f2595a0316e

      SHA256

      00b83e44bd9afe5e2873466c8eeafca1721a1f2e8151597dd86059e72eb8de74

      SHA512

      a9654b918ae1557750d3c5be115634f1b03a22af62b2aa97fcdd37a25d66c889405a558eee376c83ca7a2c38df7cd1f7280d939d14f5bae37a8d898ca7bf35b8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f10b97ce4d044c3dad230f55d68be907

      SHA1

      c068aa875f964544890cc4af6ba087ef9153198d

      SHA256

      2146dd87cb97c50ab10a8f4ee3c87fb5f121de031ad0248b9ae1944a2c5bcdde

      SHA512

      aa177512597f0603e94901a247423035b73d227349bc241db40d371c784b7bac17bcd955297eab49b05f43c93d71645e168d75ccf3691c28cc2f8a99e780c222

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8beb7e1f8d1f3df5a487f26c9f782d9e

      SHA1

      26754918f099c6bc7093c4b18ee878c81651fdb3

      SHA256

      45d8b98a3b7323ee78cd714bfdcd59d4424a1637c27fa32780dfa4dedf25a472

      SHA512

      44fcd95e009b34949589fd1b3c6195e091a8950d88e3b736f0e30aa7f074a1f49516ce40af4f8d19c3a68239f5a711775d7b76e0d5864d294442a0d67bbca867

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      55eb1b41a2275808ccc8bc13bcabf0bf

      SHA1

      4cc3dde689ee9dd94b44d92372849dd596ced01e

      SHA256

      26815ee3f976a93c18e761fd21ec03c52338e428926ff60b922480cf3da231d1

      SHA512

      e4ce3d41972632cfebff28a15992c3cfc7a6dfb17ad2561283cdd368f24b2d836f7949024bdd77324968eed604bce0237628b3cd1959701a8512a0bab20c5d99

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      3c1322f1ee50448ec6185e944d1039f1

      SHA1

      5401dd47fa3756f6c8cc6a168eb3fc2f079ef79c

      SHA256

      0bccb3af4e6fbaca45d6fa80e09de44a9d22b97f4cba9e50ababe14755f585ef

      SHA512

      ae8840f90e218c695a27f8c9f29e51de445e698d693f0233ce8d233e1a0295fc1e6d5766812058ac210df8b4a8c90d27e87c85167d06b2f65dd5467719602be1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1MXC0OCB\favicon[1].ico

      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Temp\Cab8D9.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarA14.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1404-585-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1404-586-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/1404-587-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1404-588-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1404-583-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2832-576-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2832-577-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB