Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 09:28

General

  • Target

    83ba4f37a02d4054dc888b3d473a1705_JaffaCakes118.html

  • Size

    224KB

  • MD5

    83ba4f37a02d4054dc888b3d473a1705

  • SHA1

    6faba6bc158369e1513bbd14fcd368cf096e0917

  • SHA256

    4bff451a21e912783ed6d1cef5fb3a31426310104e465ced214c18e9265a5183

  • SHA512

    67121734a336e622212e099f2c7ed002fa382b328020208295cde9ecd5e1021db4ff3f6daf6d58a7260c6abd4457b9c3ee63829db738388cc1ef8c1138f3d42f

  • SSDEEP

    3072:SYqsK/yfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFis:SYQKsMYod+X3oI+Yn86/U9jFis

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83ba4f37a02d4054dc888b3d473a1705_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2696
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:537607 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ec7b3959b3aea4389bd3885c82a6be11

      SHA1

      7f28d236837a46c1fba1486f6f43f9cda088c059

      SHA256

      010bf2c7eda2b42e0636e1e0f51c2ccf133ad85e16689eac89a46d75432a3ebd

      SHA512

      f319b775e8d2e0f2ed61bdf1a2976df34d8bf1c4acd51fd16121bd0d233e79d1de1610a9734e31545fbc232f2fe73b5262b5746a3ec671a845adc03f1ec02b3d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fd890f8d014f0df8c1fc039e6397fd18

      SHA1

      6dcd2b7ba92e3ac35c527ea9e4760ce71efe30f3

      SHA256

      3a244babc12cc8f5e7e6b0a948dbe098bd232ba843bbebfa0977f9385281917e

      SHA512

      285a0a2ec4031f396b8c1cfd1532a8e52b879323c48dd5a75b6c94786b12e4f08f1f808f86ecb325675a4a5f382ff6d8184430a75f1fd0c8ecc34fac8a6ec132

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a07263ca76070f3ecc8e69b16c101868

      SHA1

      8cf99c89ada189c94b0136ccdfe1dd48f01d5734

      SHA256

      af87bf714d1c95cd594ff51da865c2c31b3bb1d9f3fa80309f9393573f2837f9

      SHA512

      a7d2aeaf83835e7760595e5e3232b6cccfb215f336bfad2ab88515ecbed1d14f90424369a348452e869404c7cc54917ee63668d5da7f9b1784f5fc71489a2730

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b9d0ae8f07b0451e260b33d6a8753998

      SHA1

      518eb227e8b2a81d2c62351c144ba1e509185159

      SHA256

      0389fb6ade324bcb6cb8a5f6712a269781b228f2b5f748f079b88c8cf66f0b96

      SHA512

      7e41a95eec2cae59ee5279010161d82d549d94bddc5578eb932afdadb05743c753b6487e2f8d1168b98485c725472a63ce1da53961362781a078ea16dade0ef5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      96f4a192492be33690431745578ba1ca

      SHA1

      930cdf72588b9e819f0a9f0de1ad7c52a0f8e4b7

      SHA256

      df1f17e858fe1365570e6ba40a2c9dbcb6f3d3629495dc85e0471894b4d71cad

      SHA512

      6134677ea71066571fffdd000301ce6b4683806862c6233fb64a2c748272a65a1b620371a7c7dd7305b34bf5f8017116d822bb784e4999336e79e17a7ab1b9f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0758b53e92f468dcda5469cb977f801c

      SHA1

      95a3ba4dcf60418c34da451c51793931c0ac273b

      SHA256

      af4d62dac00e7209c1f8f538de8c7beedb480c8993faf2dee6845b49373c2b68

      SHA512

      0bede273d50fa3d5c2c1cb150da6644a171cb25c7aef99193ece42b4833f24747a57f4c4d0bb9ba99800146ff5bcb84b6da57166ffc9a31890a97f42858e79d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a5ac52eafb3dd18c7905621c382667b1

      SHA1

      7cd89f11e201e563a35a250f65f3dc281750e292

      SHA256

      72ff545a5bbe72fdd58d30b35ea0b1c00d86c6e8d91dec5684e5cec9ebd0713a

      SHA512

      11f7e96749ad3609c61af13c2575f290d0a1499136be7c19e9866f48adf3164d58183b68d25175fe0f62da97736d8bf870ee9785152c5d1611bba4a557df0f97

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b2929d2f451ad01c2d5416d74169968a

      SHA1

      ad06b3ba7f061ccdf708807be5ff480c2a2b1807

      SHA256

      ccd213680a7304d16b8e822b3a028a77f75348c70cf804e6dad9ecc804d2f737

      SHA512

      a6c0865bcef8209a0888db1967b62f346ec32af32e7264a39472ddba9a2a5cac92cf72958e8716df80a958579d1d06d287a92578777742d6a5a93336921eebc7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      88ed563da785953cd4219b62536bc4a0

      SHA1

      da8b070024a9cee6a51b2996bfae1ed56bcefd63

      SHA256

      8bdf9e30a9cea1e00282f3515c4df20663120a4c542ea36d98398822ebdf7c30

      SHA512

      409696e5bc6bdd9517563ce3e0692f6c1164c1ad2c7cb86ba9d8d2c65032480dfa73d855982e76e490a9557cf12277b5829f8bd8cbbac8be9477ac584d20e55d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      210ea2903458e86481f9deab787083f7

      SHA1

      7d39ecb5987cb1db97ae0430e77198bc024383a6

      SHA256

      cc0e7cbd0c4beea187a6b5bf7229f6db9e86da89610fad63511a18f59176cf6c

      SHA512

      f8690c6e2775bf792ab49d3e35a0e81bff60db1490f32f2388a831afe587c350cbc59eeeef0e0869e96b06b6abb2377c7249444429984e01026556bce89eaa6f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cae256ca7865538271e63567c356c233

      SHA1

      e94466dad07f07daaac2f708ed9f5fe69f641ef0

      SHA256

      4042c19f1b4c38bd6fc3f420f003c8d573ffd22136d2d4eb37d93b7b3ac2e215

      SHA512

      f19bcc7f589a48a6dcb0ae4d4a1c01afb27b0748a71c7d836af13599b43ba29944f761ef0f5f9be545e51bbbb53110831cd0e49ff9938ba34dc4370c6ac6505a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b512e1fc129a5c75528f7c4eaf97cde8

      SHA1

      906ca25aceab5273f0b02a2a7a11e209b5d283c6

      SHA256

      7a3c27e1168c8d34cb38baa2f8a9c95652ca359f3c624416b1251ddbf8e1d4d6

      SHA512

      13ef3ac5bf2d3110ca0cb579bb6d8c22a607d4890bd23cc275c61cbaa485af802a86bc0d38bc13a39d04514132b66decd8c9a8de5d60c8c974221c078b61946c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b6db3d6cd4a65557f73d8d837c9a2a08

      SHA1

      bf0f3d3991976c94a3787a717861ffe58a2be192

      SHA256

      39059f05d045165b393faf88538849a9f64d7ff072eacb70058b28ca1ba0be97

      SHA512

      17be1594ef2b53efdf3ed6a0fb979ff0bfb58fbfea75b550bfb99955d98fdc337d52d2602789281601def48025d94ba8c00b084c570569c30103b4e3b9f909af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d77562c05b6b403197d9ebf9a27243fc

      SHA1

      cc7ca582f5c1858051485594616a221f4c05c91f

      SHA256

      9008fe7045e01ca2ea9fe5552edbfb703d6cdfe170ee10f0d3368f3373598645

      SHA512

      9e978f3a512dfd2cb209df2bab34b4565dfe282105eb7dc7a5f23389c267aa11389adce0065af3643ae56dfeb9eff160b4db0ba6a3b93565f77ee16a3a4906f5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f78f1a12fbdd725500604404c07e82c2

      SHA1

      4910217e364f6b6feafa84ab458be5f4b7b0e9d3

      SHA256

      9579f1e0b02302e7a0526da531ab65bff49a147ff2b054b3582380a8348668c6

      SHA512

      97cb1c1b00667f543e1bd4c7c99d8fa4a849300c713b535f64409b209c170526a940b787973c2a7986fb145d6325c53b30508ac507068ff37f98c5a28237a033

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8de28fd7e05f396fc3ac7f86981c7403

      SHA1

      5038abca3a4e4e151fa38ca523a3fbbc3c7182a0

      SHA256

      720227b92f10295081e3cb876192ed67c35854c21dea25655370b3d4b7f0a287

      SHA512

      eaa609c4095fa1627f8b909c50f6b20732339cbd276e0c48b3081eb5c62d2e9aa69809e1ba7c91e5dc01c0f8d5a1eb8a0e003d988fd1f32c669cac5036f65c8e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      72a4bce33543c46f084e53d989ce137a

      SHA1

      03d8fa62a9914a7cfe990de434870060c4cce0d9

      SHA256

      e7ee9261ab38ba9bdeea1f709acd12a288f0b3cbc44f66ff91995df440ee4e11

      SHA512

      064edb8badce04237effed502e1c4be0485dfe2d00b763529c94efef38847bf1570a48f145c7001e317f58be6435e6ff84e2f6a12d03e57494e1d72350947b85

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4fa81fadb888bcec4efceb4e7d36ccf8

      SHA1

      b93dff46c001c659c6247b8f61ce60b66a54c7d6

      SHA256

      e7582c332bc92deb627ba9e62dd67f06a15b61eb5ca54894afcabfa5fa1cb558

      SHA512

      513d6206b3e89bc4b0422ab2b5b00b057a685ec7215e5f1245f634ea1bdcd08a94f88c8978a2f47fd1f3282685245aab90396983377270f65ee7836a34874c1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      51c1b9c39d8991fe064e29ebdfea7973

      SHA1

      88757162fc46a907ccc6a49e197085f7289f3bfb

      SHA256

      5981ab226bf5d8d5a2b2d7d104b6cc998da54a1686bb6d51188702937fe16f13

      SHA512

      083a20aaee8dcac23314fa315a464a9b3d86c1f83a66adec21b9d88b719c74131f5f961d221576336f3f0e4f35e56408c95c583060efd605ac1d904dc9a8480e

    • C:\Users\Admin\AppData\Local\Temp\Cab2FF8.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar307D.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      83KB

      MD5

      c5c99988728c550282ae76270b649ea1

      SHA1

      113e8ff0910f393a41d5e63d43ec3653984c63d6

      SHA256

      d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

      SHA512

      66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

    • memory/2596-10-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2596-6-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2596-9-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2992-17-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2992-18-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2992-20-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB