Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 18:31

General

  • Target

    817a248f0bb75bb5cf96fa03967eae6a_JaffaCakes118.html

  • Size

    145KB

  • MD5

    817a248f0bb75bb5cf96fa03967eae6a

  • SHA1

    82f24b479008a096333ea44856bf9d1a292279bf

  • SHA256

    c225c1819b247a824e2b35c77d9681c06683a6b3aa4367813fbe8173e443e43a

  • SHA512

    0c00d3a8a6e3b9a259758df2190d2e26c5fabaef1bb56845bb0912eb724bdd859d07eea3c828bc3c9104fcd9abe26453c5926c76af9e161ad7aaa8a12eb4fc77

  • SSDEEP

    1536:STCqFRjyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9w:STCwRjyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\817a248f0bb75bb5cf96fa03967eae6a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2400
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1940
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:537607 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      58c0d132195cd5cfd019e8f4930b76d5

      SHA1

      25cea9a601540c949702c1b283ba34077fa0511d

      SHA256

      4e4a0b9a72903fa796f92b95d17a5dae747b369b8c28d328b689ec9aa71a055c

      SHA512

      84fdb20cf66dbde47a53d7e6a106dbcdc6678c503509325cc0e05ea3984a2eb0771cae25e99c90d4953737bb0719ccc0b8519f5361e0cba5c0f40f9c0e2e5065

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      66c05ee7b8d7cf6dec723d47ce253b91

      SHA1

      e6307236580ff01b615ff81b071460b798390039

      SHA256

      8635d49a6f770e9fd0a3fb69a28b54a0a9a918d8350683ae9fe8fcb787d333e9

      SHA512

      8240c9bf5f4981e19f0cceb1456681793709bc4ae1f114f98171e014c7d82ca5339cfdfa18a96997ff9ea06f0da6756adbfcbac466175d8d5a5ac428df4be3ef

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      80a54750ff4e6ca9036357f3df21a5e9

      SHA1

      cfeccae9841534abd61073edd5d64f814a06b409

      SHA256

      69a93f19df6c33f6470ac7bf5f0e1e89dec0842ed8e3a7f694e757cd19fcc1a4

      SHA512

      c6d14da254860a8587b94a269b1c383d7e24b1941f134682911d66b125bf599eb7bd12f45d936dfb4e74c2fd818dfd154e1f3b916c3f224457bae87925792bca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5d59fd210053df0e48a56a8ba3f17ed4

      SHA1

      e2f6a96aa0cfa82f7b8ae2a2ec5e0ccd52a1ed70

      SHA256

      f1d863102a5e5dc974a1b16c594453e99fa5c8b35487d745c75537718c59a6cb

      SHA512

      2d5d868349e4b002c1012ea11ff5f7d963a5f2ef608426d196d45356041c49a2e608fa493ae8546520c7a488371a9fd0e4b9748efc452d14a66f04256e17661c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      be093bfda67d905836dbdf16a0d40746

      SHA1

      180ca9963c985bbda91d8b3ee4f98f53d47b7b90

      SHA256

      c0ccac4871ad9f18a0a70d72a2d865d7ce204a23ce02a72bb6f8c70ed02a80bf

      SHA512

      d0fdc15c784d868f0f9ae97b9500b6ae038084ef9799b12a01c7029c385388b15c8328da97c4edcb71eda1ea89d3a5824ca714d8b540fcfabad9ffa9c4a9a608

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9b2f5426e4fc3fa62b6f34f3a01ed6ea

      SHA1

      73e9c10e83a3817f90932f5e1ba48a85cc50179e

      SHA256

      09c8864215dd2a9183bfe8eff2a1972c45bbce75d5028d4498736811902f8c89

      SHA512

      d797cae95c8fe1056144a915493b4235dc474b74bbce2ea2b143fac66b0374c23706c3844f409c058be6782b5b5a9ebd27f20bc4d26be15cf0721054004619a9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      75deb4d3f5aa79de84d49d08d96483cc

      SHA1

      3026aee31c04d7abc7032f3afeb0a86be609a838

      SHA256

      b71f30a9fcc18fe1e9d49afb8927999b84534192f0d4ce664e944d7741a56d99

      SHA512

      9c9cbccd4358f4ccd5de2ed2bb21e7bad2421624dabf3e93ea1ccfa63e8b0e6468de0c38ccdb7d44400e6a2e94490768bb70ae69170fe4a4c23c9a59a7e16d35

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ee38718b1f1974f08d99e599ac475292

      SHA1

      18e4d7f9363dc081c9db6db7778ab231304fd262

      SHA256

      59680019030218baa3aa756ed8bf50118aec4ca51daf46c525c11acdae8fd7a4

      SHA512

      90af9d818ff931f7c9ac3ec87a0476c49411df6b8f4c0fc61b31f0378ca8d2ac18c4827548939f9e7e15fd23c2fc0555411f269fc4d442134f9c77751ce5fc3c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ece46e326664701e02a1be6e13936a7e

      SHA1

      ed0aa131f70c107de4ddf5b0cfee283703c81730

      SHA256

      3fd8bb99c30fdb8b0b034d431e3d99400e22586bcc3afc2655ec0fe3c4764acc

      SHA512

      48eee2f0a6ff47da28b37f21491d35d213deeca4cca09707fe5a8a26dec75ec7cf2cbbc3d93c314551f663cea8de4887508f870db976cf09919a55c017e98ab1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ef8569d756708f7f8477ef81901bda00

      SHA1

      ca56f17da1b8ffe7f549db26b664d011bf4f54a6

      SHA256

      5467465dbd053330a7546beca1784aac5f8bdd2079e4d486b569c032e0add542

      SHA512

      bdd9d29e666ce23d69f7ac38291b1b954cd1d329d2caf8c04c705790eb2f8948cef542eb7411fcd622b6a2e89eff784b4dd70738384981813f6d8a5058ec0c88

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ef30280e4db77d6e3f8c4c5bd54e998b

      SHA1

      1935d7624598e9daf7124fc54ef6cf1ba61c4266

      SHA256

      5179087f4214028513fa667b79767e1e4cf6c3908b2ee496a6ff3e015e64b16f

      SHA512

      55036df265910eafcdb60492d3a65de255ffa7a2fdb0bdcd91f48ef05f79d0853248f750a054f1f429c81ab0e5051d79fa631d31bb8688629e424fd0cab71ac4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1f68f96fb2db8988458bb89087db1acd

      SHA1

      ae7de4847a02d6492ee15d45ce2a5a5e41062237

      SHA256

      fef0f37eb5e4f9d6bd247de1e7f919f743beff0dabac71e5ab69b97f50b7b75b

      SHA512

      2d3dc6fb0cac600033ca60e6f3af1a430bfa4e787a6e9005b7407817c776d1445eadd74bfe61a8d2349ac6ce1c9975415531cc9a25d5efaacb7ad8aa60f3bdb9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      968c98eef863e201f77d7f4a81a5c0e3

      SHA1

      bc07b17bb513d926db4897297f6f750c26df7145

      SHA256

      1142d621d3e729d6b84e90b6968f6e97eab9e1c53830e4e27cdcb466ae09c204

      SHA512

      0fb807236c833ae75fbcecbc088b9817d833aa75b75741cc0ab3c3526d1aa284bcd0915d1332dc4dbde67615fa056afa9e0737f8fd590a213aeb70b6af774973

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e4961a419da462dc7430f4d303d1f6dd

      SHA1

      36960d4b9feebec2088db45069fe8906fe8f7a32

      SHA256

      959d50f9b470dd81beca50ce34c439c92227d6a67b5cdea53a2a2e32b28b100b

      SHA512

      0f99bd5343df1053acd1f09ab4999e1fa16d50cadb09dbe3c18388d3266036a44f75af071ae99292f854a4923862c3495130c30e344f8e0494c282f75a56f43a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eccb815603c9c49aaa44596f0afa658a

      SHA1

      bb413c44aee81d0574e6c55687b019ebb8fb5701

      SHA256

      2e7534b6b91e20c5f3736a14044072f92c9b3105dabe071094a42a2d4c90c2d9

      SHA512

      56efc2d642aa64ccbcdf0c4b46dd0ca213a2545beafc4835ab030db5d8666de306eee58a3eccbd2ec6a35695cdba8631b8aaa06bf63da90ee3b66102086a9ff5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0e4237300858645905a915af6c112dd9

      SHA1

      4a9824249211457f9e46f289e4e3b83fe4b40f2e

      SHA256

      1899fe331d01a57afed60f4bf759648b0707e4407b5f5f036f203ae7c82d9af8

      SHA512

      6617f14f8d178fecf9e395ee4d9d164cfa21abfb16f5f682509858f88cfc8404224dfa613cfaff0b365f0e48cc557f6cc98a7ad76c4fa9edb0c20e493c0fc351

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eb4171325a46b48be90cfbbdf3c19485

      SHA1

      a25eb4fbd246b5344e6878b1e005e6b45015d91e

      SHA256

      0f68d01d61bcf38d5dab75df571bbe0f7b67f83edfa8419323849c74b3048d33

      SHA512

      2633c05ea7270a28606874b72c3631a2f25694141b3dea107625f9e46f11fee579e3261fb668008c657194095c55c3d2d4e075d7cde14c2570e267d56ee3e497

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      52fa0275b79c17cc5fba4e0d0ff9073d

      SHA1

      1e16d33e8e30b599a06d31b1e631e48595b9e19c

      SHA256

      c95406b99a7982ce6f278bdca62c5020fd8f997e01c1a7f82f46e0682d72fabd

      SHA512

      646695a7e3ba030059d55ea5bf58b394c1996e2c7a98065babcecdefc4c912fca9049ec6438b57405d4a4da913f0fdb06cf046a980cc9bd5ab50a620305751ef

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f1050b00d70c4c5705b47eeeb9536095

      SHA1

      b049efd85a8a4fa8fd5f08aad5c5535643788643

      SHA256

      aa2043f34d81ad4e85c3c231ffe438942a0f555c511864bddd9f29b4debcb724

      SHA512

      220e9339e67d47d65d59eb74211a6951ac4d54ca985b66bb681b8027731d0275c42ad89d05f62cbf52c62026689dcbe73eab8402995d12fed4cb83a3320fe020

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7ef0f63ee27a324c8b791d7a7aaa9106

      SHA1

      92e2be555b7916bb5e148b25dc3975a1ce80954f

      SHA256

      4b9a366fbe64dda08869380864af175f3bc5895a3ff076e8814bfe89ca378cc5

      SHA512

      a40b28d265173939688ed6dc4c63648e472685e4021a3c57a3478599b123b5341b6c7dab31598917a340f9bd40c0b618f852320cef2af23d8c1b0bcd015d4c18

    • C:\Users\Admin\AppData\Local\Temp\Cab23D9.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Cab24B5.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar24CA.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2064-6-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2064-8-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2064-9-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2400-18-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2400-17-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/2400-20-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB