Analysis

  • max time kernel
    142s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 10:24

General

  • Target

    83e56005794d6fc35a4b987a87fbfe2a_JaffaCakes118.html

  • Size

    140KB

  • MD5

    83e56005794d6fc35a4b987a87fbfe2a

  • SHA1

    659c6c77ec8b6bda87fa2281278eec0e3f293317

  • SHA256

    c499db60afbc992ca59295f4d75d8faed2674a69ef737c4107828a0f2c357dff

  • SHA512

    0a72daf60120f2dfc5f650991126cefd4dac5142565f254795beeb64549e43b30e9807525b7b57f87253bf800f3d0a1299248904af7851d9bda420c0e214bd1d

  • SSDEEP

    1536:SPGk9/o+6yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:Sv6yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83e56005794d6fc35a4b987a87fbfe2a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2896
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2300
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:209935 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      32adbbc58309399427bd0eeb83ff85ce

      SHA1

      d6a39f012693e3917e0cb2392fd9533295a0cae5

      SHA256

      9de94d77079f9808963893fad3446626fcf16c1cb2e2452b28a94772183039cd

      SHA512

      ce94e73489b3a6999fdbc0f3c7d7a5e6b220f5fbee9a8a6131d2c5e2f10f6372d4ed692ac7e7fb27cdf1a1fd51885cd7a0cb35216cb3732d97fcaf6d355abf74

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c67fbc6041f9be8f0fe1795036e63516

      SHA1

      9a7b95659d1469ff6bf0cd1b41df2ccaccc47e83

      SHA256

      9b3ea698dab4feec5a4d8d4a1ab86cc8bf3df3cf90a5d7722d81ff9a337a2795

      SHA512

      c0356acd28cfb6d5fb8d1ea610ca08c4080147ab0c4c86cb0bf7480666b6a64d32bcb9dd5060e91857eb43c6176a3ba09cadd28187b1ad8cd728363c31b0d635

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      50322bd38011c1bf1705ce9a483b40bd

      SHA1

      70648f17fe7fce90b39ac45577e979cbb9269067

      SHA256

      98306b48e81db6fe193128b7a381caad5affb710aec14138da00a696c3252ab8

      SHA512

      1628264596cb2c5c3a811e6ca10c2038551d19d552600ed5a8981a3e7b6be30df63bd1329243f392ae76811a05880cfa5771b563c650dbf2e35f4fa6b3ce9846

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e3f96420ef6883b35812f063673515a0

      SHA1

      00ff186ac6e0760ae48e286f20d45d4f1e86503c

      SHA256

      dfa88f01421d82246bd8ca2b84fae52a8e99d7b7341a616992d06bd1bf5603bb

      SHA512

      30235dbdd81142d9d90b1da7fcf69ad568baecca57298c473faa766cb96e6436399a27059784e265b57cc1bb4bfba4619198cc499fd27a72cea3a64353b81a68

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      35162bef23905975f55844ac35564262

      SHA1

      2469f1d476bea4432597d57a4bd66042bf6f9bf1

      SHA256

      fd2450d955889b6f6ec48e97b9aa753cb91dd583ab4c5f0dcd1d5a6070a4759d

      SHA512

      e2b8daa6c76c8d684f30cbc224491ad74e6d1c0e04c555bd1e345066353584979db33fb98f3683b5d32fab7910401aad49391c795d497d4848f4fe6142f3aad8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5338a65a2bbfd6deb29ed93ebeca8244

      SHA1

      c6093254a991894e075419d7308e70f724c1a661

      SHA256

      b90884eb372942d051a1f64cf1ce02fd3a0a0c9f98983e2b81e732d8523b9531

      SHA512

      360b5ff41a1c8bdce13cd0f7d954321f4fed46c07e49baf682328b22b23926b335151f983171a28eb5bc119724d973ea2d77e8edb22296d2ae09047dedaefb94

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8cac552c125923217d7882153e5ec06e

      SHA1

      fa2bcd9ce6a9e2e7f69b1b493099ef89c9bcc42c

      SHA256

      90db9102a5f06b19beb13c9ccd5e76997f741b2108e20e80c1ac60c21c0202f7

      SHA512

      a9db5a64a4e4365c4a333e066cf49dd00d6887afcb30ed881818e400e4ac220ed10892f4587af4813751ecac6f4ec0f88c61ba205f1300681c0e7434efac3870

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3ceb35a3f1be5e4350b308a47a5d1a32

      SHA1

      10139a3c6b189044c35a1ba5b931293df468ac32

      SHA256

      fa3ae848932297c6691965cccbec20f721a0aa4466b98e4a6d66c9167afd3274

      SHA512

      3a34cda0b297e3a0986dcced75d3aba7df1fe42778b2b8e4aa26dddb9b120db17ef9b8575e240bbc34c33381126632e56d0a108828290728ccbba9bc32262223

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      80d99f362b6ca052e7d46b109b5ef937

      SHA1

      3d7477d54ed97f537f00e377fdc5768090daec58

      SHA256

      cf20a0d1334cee237db757be86c90947809b7148708517e2c480aeb2f803ad1f

      SHA512

      83931a6538c905a29fd0f7822fa67246d1048f51948b3ffa84fb4f5c1f4d7466784f3c85f20f385aebab1c65c6e02338d1a8832fb61407a29a192c94449a4da3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      130750059f5537d24bc9ceae0f9ff8b7

      SHA1

      a27a270c35ef2247cad21cb133021994acb61fc7

      SHA256

      3838c4ca21eb733e14c2a44fc8dd2668c8ee44860d015c2e54fa7e5e2b02808a

      SHA512

      45129bcefd927c8e32cc27bbd2c3f256cefcc57defaa2764e1b46f9fe662bab29399f9453ae4f2d8f89139d11f6e593c12f869ffa95cdcabe16a09a6a048ea0c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      14b3209230e5f45bd8be06c59abc25f1

      SHA1

      eca0036d4fbfcd44f25c29369dd38e0c37eee6a9

      SHA256

      f772f269c2846e0d5d63d45f559dc5faaf22139ea654d53306fc9d1b2f0e85b5

      SHA512

      f60f59619bb977469df59758f2e1cb93fa49a3b317b0b5407b73fdefd2642a9fa049ac900c383ba8ac7ab9e3e3174430e300ea7b6a864a274b5a3f77946551a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bcecb43ba606393829c4d7538ccdcb58

      SHA1

      1aff073f68d39e29ae9cc885d36d01e9678b18fb

      SHA256

      b212db5fa09cacfaeeeed8add7e73e75c6d10a785d09344e2b559fe764e7db96

      SHA512

      41b156b81c57364f1a1ee058a26c634bf3c14ca461d8d9ef86687a6e7702b48dfa1fe529725db8a27a9582a242944fc31fa1d6cf0235a0eda61273c0971f709e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b834bf3b2f1d3d5100e8dd31b7021d07

      SHA1

      c10a32aec97be5abcf8e38d73d22c0d7c2fca227

      SHA256

      7115e338908e0e30ecc8370bdd49fe6d98e0f3e535c54b3ada9367d9f077bda5

      SHA512

      3786739af9bdaf4ce50c300d4604a2e557e5226133acd8faeaa3eae9992ead73f2f3c55c9c702d76e0663ceacfb71de6605bd593ca6bed1c9824e21279ebe2bb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1435ae142e200f959304a61093f51dd5

      SHA1

      8cbcd4559953879f3bc5e8287e574e7555dd5e0c

      SHA256

      075d063a5af2e5ff85d2fa91669afde3be30e088bf520c476bddd3a0993e26cf

      SHA512

      aafe4174c0033120e3254c0911a483ac658929b1d1fbef2d592e5678f39cb410ede5c00ff75115143e30fe34c1bc9e7e11e1cdb7fc402b9b526f19f9b2e02d4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9585c3a9bbf8e43d4c13461c3ffcaf36

      SHA1

      e2e84ce075b888131704bbf3539e43052dfc8b54

      SHA256

      f7e21e54e23cef859b3e74bb340c03b43fbfc74d9f48021f7f003b703d3e61b6

      SHA512

      6bd925ca93a82490b5864de446961ac687a65e2ca496bc60494aa1e7c4491606f738736166468115e7f5e39696511841418699d35ecf5c74a4ce4ed5fd588b32

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      959853f3561962ee94709ca113cee2e6

      SHA1

      786f9654d132d449a06fe868d2fca105fb84d58b

      SHA256

      dd0f0558c1e146f92cecf424d572662eb60cd526d58ea390f993576572434f63

      SHA512

      c3ff756fc9b27c0d863ed8a19e1e33ce87e41b0c767abe8fdf124868e05c48758725efe7be59b447bb0c72afb8b4933e3c539d9f0d771d810255679ef8df8454

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4c573880e86a67b19fd49e1a24f4aabf

      SHA1

      171ad729c626e778a50d23361eb701ea85e182db

      SHA256

      13073e9ed65e0c3c3344461d02bdc6e09e5a0ec4905fe4391c51cb3db9129db2

      SHA512

      d09a9b026823169e6b8cb524eeb1be4a41c6ce395910d16ea7d8a080145392046e021dc93558340b6a8c458cae0ae1290ba04fbf370d3d9e62693aeafff748f7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d5d86a4e50f359d5ac50e4813225dbbd

      SHA1

      926b9f104d62f77f7ed5f87dcd60ba57b63221ed

      SHA256

      58da4383b67a0cc5c4ab1c5b6121ed4bb1a837ce7b45f5f8316defc471e9f4c3

      SHA512

      2e989ee0d4946129a95080c1bea4c7c6f5bfb828a7896b5dfc4ff1350766eb149936685ccbaa80bb8f5f2c23ca80b9b3937cbe22f443f2ddef444c601b15e339

    • C:\Users\Admin\AppData\Local\Temp\CabBC6.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarCA7.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1052-481-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1052-482-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2896-489-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2896-491-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2896-493-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB