Analysis

  • max time kernel
    120s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 08:21

General

  • Target

    80154924a61a6f54c81d81825c115e0a_JaffaCakes118.html

  • Size

    121KB

  • MD5

    80154924a61a6f54c81d81825c115e0a

  • SHA1

    f58920f5ab8037fbaba4f5f3d1c89d9e0f24d426

  • SHA256

    bccebc91127516e496abe93f128f2bd1fe454774b4f6f9dee58c50270a3c5320

  • SHA512

    373ef8f82252824d5a462dfa9be5538cad2954be78eb7b6aa7c987cf9337fdb1749bd023f9f09b7a88fe81991a1c34e32106c7ce3e06e889abf1ce2851d7f2ca

  • SSDEEP

    1536:StIOTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:StIayfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\80154924a61a6f54c81d81825c115e0a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2860
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2100
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:406535 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:836

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b71ab36f9591c504304f611e2fa769b5

      SHA1

      fcdcf8949ad6d2e3ae690700a2388a98128b83e2

      SHA256

      b8627d4eaf3eb50b044ff29a1e59e77708b01a43543b605c93bd13f31e2ed253

      SHA512

      fb451fa055228ad8e70f4bd8ca4dc19242b843914758835ae51ecb2d54e92748d4598df68b106546ffe2e5fe3c188176402ec6c93856f4e936ee75f6767729eb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f947425d1a489d1631951a926e483fd9

      SHA1

      8a678b4f4e1ab57dc767e5fd98b7810f77bb8cd5

      SHA256

      515d1ac722cd31222fd77b70d6cf27a881b08a6aa9dae7ae198a4d3970d9fa34

      SHA512

      a50fd317b8c0051fb58cbb9c24f2cdb6021d5154a3e811214cbd233c0acc42698e22256300e22d5fb4e6710eabc98f6957a0b512ad66d7b606d3db9c699df86f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      23b6a8882edf0f0790fb4d1f8a41f063

      SHA1

      1d2bd4f1fb6e57018b12025c3d76d8ced53447b7

      SHA256

      ffccd2a74b574f9163c5b3bf1cb221d58d9833511412217da9a4d5b61f6adb6f

      SHA512

      9be7a8e8d1dcb06dbaaee518fce2a60c9932156d7d00547320bea178aae2b851c5478c72f4397840d8c24087ba045fad844419467bb8c671d0621f62e4727102

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      99dc8432fca39963d286e6b223a76f97

      SHA1

      f8e2c563115429d898955a1c0dec579526ae20d6

      SHA256

      e5ba6398e6647063402cbd49345b5889bca505483f41e53c40aff06418fa1f12

      SHA512

      b91236124cc93e0f33e8ce88e0814344824fd36875837ddd225b27c3dd25889e73ab5f2ebda4450cca56f055b05ab1cc525b016e7c6651e9279464f55ba81b68

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f231788a4b86dbd9c393a641e4b603f8

      SHA1

      8ac26795d1684414ba8d658921d062bb42228cbb

      SHA256

      39b6b4e1bc939058240781f30dae849cbe04c73c69370539950179b4eaef4775

      SHA512

      a26c5fd6a62643651f72b851c5deb9d47e232e3a77cd1988c1c45095e3c4a4ac28d4531def837ff04af3ec09455c167e233c454f3e8f540977e3f725f683b6d5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4175d47e6ec460901c131c02a2e16901

      SHA1

      d8b53b66403798025cad2dd0c9f69ecdba09cc25

      SHA256

      574a1241121ad0c1e801f9332d5052501978ee15a68e27d0bbca1c558b3fabf4

      SHA512

      f9290b9c9abd312172461b53d99c493001a5baa3e44943335d6a2f52ec7d44adb4914238381d1c40fa76d72c989640a557df5109108df35b8f61f9f9d1683d70

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7a04803d4c5bc1114066ab8c27b87973

      SHA1

      a31e5ffefb5aba7d4804891a4cae89c5d8dabe18

      SHA256

      697b313e5c15d9b3b43c8df5c5a28b9819e3e2735b11f28109553c497766bf82

      SHA512

      6eaf02811aa3340e2918d34a8303c2ff9081ca54d64dbedfde6e99b7d1fb09d206bc7d2ee747f71c608f1a56025bb8c72c8ef863441c38a391dc8816c10065f8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      37c94ed0c86a5c7b706dca49766eccd5

      SHA1

      694390f3590575dcada26f7b52e68888cf09e934

      SHA256

      f7e3336632ae1fd82e6b72aa926642bb3e0f86ac6a916722460886ed201f1b57

      SHA512

      aa7d6dc85f619bc21d36e359a26faae83af4d1b040ce413541b0e198dddb30f041b80fc639c9ea2c1da2de03e414fee45ab64de8641af6046010686a11f301c0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0b6502b5e25d0c366cfcafc27dd74d33

      SHA1

      349c5c9ca4bb503403b93557d1316d66debd8b5c

      SHA256

      0decdafa821ef44c208d649c220c6aaceb06dce3d8532c304d26512370d3422a

      SHA512

      972b681744671378d31dd8c32ac5ca37aa6186aeab1b9b0e84dbe42144c37280a3a9f1055136f22ba66a5661a7c93c710bcbca583fc415e2cf225f4f83f4689b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1ac0dd2cff97d6a52b2818389bacbf32

      SHA1

      48bb08e85268756d15e5aca095eb0ee65b99f92b

      SHA256

      d67963c27044c8d4bf3856f9625d8beb9e6f649d9517b575546b54f1177f4f51

      SHA512

      3e09dbe23f7d4377993c171b8687db6385073025a7c446b0f83e6c1b3284c4d9a2cfe9b21f574e8c68df8dc805fad0d63dd95095908db2cec04e19f41e0d3b32

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      723de51d666cb68e1c06cba39dab4747

      SHA1

      5ca70ea7c74d7cdc5df56ed1bd51f9544422b0f0

      SHA256

      09074c295ef8e548d2d8485c07594cae666a4168a9715ae296ff4cce5523b2ad

      SHA512

      9aa2bccd843418280486f6ea3e83edb5fed67bf1061740163cc3026e705065fade768329774a7ca23dd441bb641fc451d8df72b633ddc9cc4b50d1883fc723b3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      db7de817fdad3b5240136cb321631cc0

      SHA1

      10c7162914bfb03b50541858cec56ee3d7492edd

      SHA256

      98050daad1b9284cc979344518572eae74043b830a3935063cf3b2a9cec5273d

      SHA512

      f76caa55a49d3ad923fbe079abbd80ce8dc2fc1d053698afda18605b306e251aa25a27d0dd591a1f7237d85751f24430fb418319a2305a95046506ebf036769b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3b6aadf2bc28166f27074f51d9855b12

      SHA1

      7f69bc765f09e4ddb244fa40118bc520e26934ea

      SHA256

      142897bc1382eb3b076696c7416458876395ec61896e4ebf96484bed2dda664c

      SHA512

      bcd81ed6a3473c6e0c6c9a26d2f94b9555688b73c002fe09377b76bffb6c2465bb84100d0910d87a74d6b34e29ca39daf76aabb7af5a5ee896bc7a3fc45273ec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a809309b523ebe4b23cec437a0cb3265

      SHA1

      dee91467ef30c1fa7de3d92b3e2dfe85f52a40ae

      SHA256

      1a77ee5fde3bb966e5688d24101de61afc5baa68c1c9648ff4c2875ba3bcf400

      SHA512

      9ef1fde571f1ee0d56b5e6bf2ca856ad6005c4147783cb4cf790a87848d85ac82a1d21f8910f411a3d4fb90386ce39c3b46d55890fcabcc325f99ca04712db9b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e3e6e52f2731d62e53844a0b5949fa63

      SHA1

      36aeeab9f809c98fd883f7a9d58cc37a0a5eb010

      SHA256

      14cd4390eaeb937e680269a26b96a21db78a27f90564aa4880034a37eeba3359

      SHA512

      5e6b129a8279edf8c42caec8818d42d82bb7a53142ad62eb301cc0e22a4120744654848ebf0ca1fbd6070d66f57119a281a74c8c3f7761f563cf57072de378f2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b397b44871e53daa15f0106621bf5b66

      SHA1

      2f92d89e0afd9de4acfd2ec5365e60570e9a678d

      SHA256

      ec1ff17254ad5e49b0bbfbeb842b19733b1ea819a4b3656211ed16beb126ffb2

      SHA512

      371c55a4cd93455618d7746c5d04da5efb541808ac567e87b5ef3083fd55b17eb7a34d0e235749cbb75a2fd491c07d619559edf16bfa9ffc011030050d24394d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eb80758843c9b29d06972364c78a033e

      SHA1

      ece1ab3e3a351bd8f42b2e2158a746bd484c4218

      SHA256

      7e077c2e3f9565be7ba068ef856b1083f74a08b14c2293c5010b3be12d2a5367

      SHA512

      f98511b1570e9433e275f41fe5730090c809a36b13f93be18d97e72f8437ed5ac0dae36b5db5533491f64e6c9767b6ce4226d0aabb9141ce7da544b20ba9d719

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0398552edccd7d337e484705d1965abb

      SHA1

      50e7d0f2b2c1e2d041360758c33555df88062e04

      SHA256

      6047f6daa04fdc53343715a4df6ef64f0722f962463f7209eca71a5e8b91df23

      SHA512

      c0f65a6fe69eaf85dcaf2b94c67ce6f88620a27b0df64e94cf55d5e6f63f2e0aa0698f4cbbbdd66ca5991b6b14801ef44b76415b74d2dab2ebd53448fc5cc29a

    • C:\Users\Admin\AppData\Local\Temp\Cab233.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar384.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2272-8-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2272-6-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2272-9-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2860-16-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2860-21-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2860-20-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2860-19-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2860-18-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB