Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 09:29

General

  • Target

    804437987632ce5577c9bc8fe75537fd_JaffaCakes118.html

  • Size

    215KB

  • MD5

    804437987632ce5577c9bc8fe75537fd

  • SHA1

    498b597bd0c83f21724f0c9f60aea5e79556ce20

  • SHA256

    d9caeddb08f8a93e827bbf28bacab38b0bc12b9b9bf5db97d70b094b7a43878f

  • SHA512

    734714da7304074a5a9d68601162a7bb38b3fb074086eb6e79082e9c77247c7330a3ddfc149207f5c005457a493271eb302660a802ff9f98dbe8c0580774dfa5

  • SSDEEP

    3072:0WrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJM:5z9VxLY7iAVLTBQJlM

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\804437987632ce5577c9bc8fe75537fd_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2204
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
            PID:2536
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2512
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:406536 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2392
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:930819 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2428

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        4687c311f67930c6c22d15a705b84a92

        SHA1

        70e07d36fa6af22946e425c79a7ba1ed44286965

        SHA256

        e50252b82863564e82ff13843d8e122ac0175dd294d01292a113818336edc621

        SHA512

        081679e51603db25bd379ba7d035159b1d64e9f477a8949c0c1bdc7543a8ef0c1fd51b862e768a35aad8c85dedf25f3b2f05a4da3c58466216ce42421c3febb3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        aa884860443a016911e1278b5014e57e

        SHA1

        3949cfd3223384b258ac61e85c16e8d1ad9ab6e6

        SHA256

        2ec6d6a03668a3aaf8f3411c6b8c27bfc56bad51f8a03011515087a47790417d

        SHA512

        c2913dc2008888fa9f712950ac747ff686c5614b11f69a23961b8ba23f638dedf0c27bd37823718dddd9295e79f7432db5efde1d393a8e15dacc330b4ca9c46e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        6abbe32003d88ad131695da66c7bde0f

        SHA1

        a2a2dc39fb1c217291886e023baeaa3b496f280a

        SHA256

        5c98c9921f682f28fc483854df8b0640acc12a1bee96a7d2457612079e1b24fb

        SHA512

        829e5ac6fa17058834f956f6134e9ca89b2e348b1a7c59ad44d81491d13084d489843e15bfd1862fc3934762a7c1197f577403c8ab332826f0c1be4abfb20425

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        36d4ce18c7e0b6122f1d2a7fe4428741

        SHA1

        92e3d7619b6d3f0ca4cf0805b75a525aae2292fc

        SHA256

        551d0a4a4865a929f47370c64d1631369f2bac018c5d398bc7663679def5bd0b

        SHA512

        898c3c3acc55b31af22ccf086c8217108aad2fc5161f98e70e8624dd921af0d4e010a51af19d278b8cc8ef5f1467658779ea1b4bc9d0bec3a691ef00821d1fcd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        2d088cf59bf6b3a4d317329412c211b9

        SHA1

        e020b3091afa3ae0dd9dba4ae34bf4d622958f47

        SHA256

        cceec310efc551291d796b2fbf4c46861c6a987296f35baeb346997ced095740

        SHA512

        06dc8b638237ea72978c5880bfbf23736ac3dad3e42a088839179471c73f0f18bdfa87df4d27d035dd57e465c287ce3751a00d16562473329ca26df7a85852cc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        a6c0f29ea7fea9a645cd13ab8c28c85a

        SHA1

        c73acc6f037914ec9c699c58cf851295badb194c

        SHA256

        5ede398f6bb057a0ea0ec4ea7845b51a76b97ae09ea80603676323c95473a6d1

        SHA512

        22ce8d5017bd87ecb7bdfb09cb810d109a31b9eb9eb0e1ae2734dce07b0e9700c467576fa8e10c15059e160a61283ea1aa6956fa2e21f9578f4d1e34457b9efb

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        fc77e43f0209d2c3c939a3211efc8de6

        SHA1

        de7247296518b52a8a9e592e7acf1d30bfd4568a

        SHA256

        cc5d4b457689103424361f97d78698e8b5be57565b3ce8d82ec1eff43f48cea6

        SHA512

        71731e6fa09d4a51f521c173e1403bd25e1ef7ae0c0369ac9914b98a6b80f81031cff583d9c81975c537ef0aa873c7ef7be4c3e0c3cd57132067e36eb5618234

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        147b5924dcc2281b55d7d98c132c5a32

        SHA1

        b1753cb6acc3e2505a453ba247cdc47e771d9af9

        SHA256

        da13bd9e55972552fdc98672d49395de88962785a9d0c4ae24a56bedbf3e54a1

        SHA512

        00726c3e8ce2f513853c17aa342761844a9b9d46252d7b52b52766ad1907c98f09b0bb982b1f29a818ea71384df2a7f483cd76184884536955ebabf281d7434b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e45e80671d7e761ecc82c64e994f306e

        SHA1

        a76ba7646b6b517d6b53316fff86aa4157a861bf

        SHA256

        05599ca3a9c82ebdab836c2476123fde82c110d5ac64fb8991c4e3ac6c00b078

        SHA512

        2e45691233be21eeb440d2d74df94c7945f9fc2c13a3e4fc74c672ec1c30c0b58b8a5420558ef79072d123a75cf09ee0845d47d4f5535cf13e1426fedc4cd751

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        aff854adba9e94055bc50a824fad7b47

        SHA1

        14d156bd2e9bc30f92787a0fc9ed80c951f094c7

        SHA256

        8e2fd109d2e011c736ad690dc6f2549e5d9eeb6f0cbec7579414a2115b2f4d71

        SHA512

        901384d45f5aa7b39ca0b677091bdafde926ecc1731669ee067bd8d19018bd243058c77617215c319991e2f2219f70cfbbf9b459b689f87f8dad7e78be238439

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        c4f45be970d3ad037534d98409eabef7

        SHA1

        70890085885047f9b9c283001513a82b61efe38c

        SHA256

        22453080d040c34b4f9fc5374b73ae477aef05011909a65bab23514f6797e703

        SHA512

        1ebb2a052445aca751f882bc77938c75875abc0de5b352a5a39e3de183ffa95306c6cf9bc2525602130d94e8f2616e2b9cf1842f1631080011cb7ab29053f669

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        ff7a4714c858d163570be65d0579f442

        SHA1

        35112cfb7985c7b85baeca4f63b24455b9b4b69c

        SHA256

        8208a8cb0e7b55491e79a7617a1b17d6347401563f3a804b6ba8d2f7a06c2dbb

        SHA512

        34b1562d542a920336f32fe3caaf0df7035d9178e3ebe33134dbd041ad56091bf61011d64f482983548eaebb92e47219f3e03c75d612a77ea2e1fa911ee1c7bd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        4017c6f75bade4ac38a9f9bf4dff31fd

        SHA1

        94c9e28ddc3c842753b53c026ffc481bb469be64

        SHA256

        151bc351046365860e2d5671c5ef28b94e634fc3dc2785cab644a0e8d9baf90b

        SHA512

        50adab50027eef320f086bd127016c0aedce7ab4860b2f20bcfa7cd3f8185ca7d0b58ad52c4a1caaaaf6f9b718d1ddb6e5b2339a4c705a2d4361532bf8d38aaa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f600fca8c4d80db27e3f83e0560f8630

        SHA1

        460f5dac4ccce38d2f948ee201148d277ba04c60

        SHA256

        417c1a59cac904d0f9a649e275a15011527c0028f9c8e9e72dd194713a7764db

        SHA512

        7b3440f7aca9ca2a27d46cb4666fe1e4878ead2d44e65506eb0672b70ab8d86d153a1e4e909556ec079226976ff3661dac9c0999875cf8c2c5acb707f9b86ff1

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        c233b780d06e5eecd69ceae40199dff3

        SHA1

        c04213bdefbbae6d15a15070867591f21081beb7

        SHA256

        2b4a4cf475bdd6deddc0a768d6854113af503460839fdc53946be2f191de959a

        SHA512

        b6741bc0e6fad99dfc13088e90c84e900fcebbb9677327c925b55dcc6ed1582445ae4eae032cdc1a6509c5d3bfe401534e1b9fd32e2071d95ea2802b4f9ef041

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e4dddaa87f06db6f94380dbc01be7ce9

        SHA1

        5dbab6d67cd063dc54d3925e74ec4a9602b366c8

        SHA256

        805fb8e9093a17e89c722102ac6f1145f7623e63ed732ac13d041e04b620f784

        SHA512

        ea6490dd62a3c363ab716fe6735843c64a31343124126d14edf8ecbe4a9894a455362a1043e0707cb6ec11b2d113dbf78320fc50fc030785ce80cdc1195e0262

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        7b9dd35add41084b14706ba0aef0165b

        SHA1

        cce2c367eaa53ce82622ebe69725ee9b8a94a29a

        SHA256

        91ba860ec4d24c4bbf4252c123830814c05117a6bed34dbdbcfe3ec1f1ada4d0

        SHA512

        4ab93e2806351d31dfba10027cd1a6cced6648274debe2e096c7e8880ee4f0444cafbacbfe45b8117290d01f391c4a55c744c7035700c750e2d19a32fb5dd92b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        ab5f6f12d696a1f59e7d6f3a48c3342f

        SHA1

        a1a1a8996fb5f62ee849de29e290688dc7a9472d

        SHA256

        0c3940b7843fd8c896cc4f9d9f81754ee91440912ec0625f2f73e6afbfe5f8f4

        SHA512

        71faa6afed4f03f5ad4a158b7a40a67e0251e49d5608cca4bf1b7bfcce0267aa460e75c98388092aeb1de4f872102005a274e57aa398669d0937920a9ce33198

      • C:\Users\Admin\AppData\Local\Temp\Cab2C9F.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Cab2D5C.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar2D80.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • \Users\Admin\AppData\Local\Temp\svchost.exe

        Filesize

        105KB

        MD5

        dfb5daabb95dcfad1a5faf9ab1437076

        SHA1

        4a199569a9b52911bee7fb19ab80570cc5ff9ed1

        SHA256

        54282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0

        SHA512

        5d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8

      • memory/2204-11-0x0000000000260000-0x0000000000261000-memory.dmp

        Filesize

        4KB

      • memory/2204-9-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/2204-10-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2204-15-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/2204-14-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2204-13-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/2204-12-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/2204-16-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB