Analysis

  • max time kernel
    117s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 10:42

General

  • Target

    8a38c3ed6bc319fc5543312f691be169_JaffaCakes118.html

  • Size

    348KB

  • MD5

    8a38c3ed6bc319fc5543312f691be169

  • SHA1

    e85c2ce7792cbc35e8a19507952e629af871408c

  • SHA256

    a74dab42c65412f3ff134f8cfbd9fb2843a00483f48f6c500664ffac85cfa157

  • SHA512

    fd03b8c17842663c426dfcc9cdfda4aa28d138f374c16131bb9242638d91c893734e09b08483f2b0ad4707a72e2d7836805687a76b2b57493687aaa580902c2d

  • SSDEEP

    6144:XsMYod+X3oI+YbsMYod+X3oI+Y5sMYod+X3oI+YQ:75d+X3p5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a38c3ed6bc319fc5543312f691be169_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1892
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:1736
          • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
            "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2372
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
                PID:2448
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:2816
            • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
              "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:268
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                5⤵
                  PID:1948
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:209932 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2636
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:5452802 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2984

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          acc078443480d193c839c20558f11909

          SHA1

          84acca18b3965076807109a9a5234036d6e7ecdb

          SHA256

          941d83f5485e25c9e65ee4cc86adaf1f472506bb545f4d97e0b17aa61421dc9c

          SHA512

          6e75ab78b5669187c06ce8c3665ec2f860e7ea5060d5428f1660a6209b743e9615bb3a054c011b686dd4092d2695f53381712be35c4d1849efac2c4a6924fe00

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a703c6e32eb5eb231d9349fc163c79ac

          SHA1

          d1c2a40a125d9f6ed8eacc4ebbef6e54bbb38f77

          SHA256

          2632fd876cf6a11ab64e76d4b582e0ae91c5316a5b386d67db1d490413abdca5

          SHA512

          7a0d5d64790e29f536bb51380ca1c5966cbc4975ea06a3454d66483c55723ccdfc95df13f52c2bde33a5b89696209859fbc4dd9792384d2003f2b4fb3e1b2288

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dce099a0407d825786a2804e8b2d898a

          SHA1

          1ebb7b95da0fec2a984fc7f0bf7c03feb52d0d21

          SHA256

          11fb51f27a0f2850e71ababaf187face5f71f4c2906ce96d905da6377e9b7bf1

          SHA512

          bd41c7d50590ba540f3ca5e230048bd4c8d2b4e8f909d99dc266473aabf8f4d6fdfe3468e7502536037b1428a2f181e72926b126dd870dd5f6f82a03dacf4795

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4b1e0d0f2aeef7533c1dd356a4933e60

          SHA1

          568391ea79f865855460fa7fc8ed43b68ab54f0d

          SHA256

          093192a4f19e51396185c2762edf67ce7e680c3f35229cf70971e511c26a7289

          SHA512

          1d8d5e970e011de94fecea54879d6c7d9d8454b282f81c116e2733030cea8d19e93e0c291c903a72e1e8cd60ddf93f54046e72f6497a1f329e78321ca6d58f7e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9e848be2610d7301aff63ff0dd5f6b3b

          SHA1

          ceef8b5c24b375fb313bb3bd295bb26e8de39acf

          SHA256

          2ca7388c8a73a1332c49c5326b53baed71bd5813a7b52f9baba883e3ae041a34

          SHA512

          21bd86f23c7df6e5c7ac50b3a2324d5b73d1ba7d947f91e73dbc2867779dea45523d54c42d1077f827afddae3726e354ad6463279140c1aee2b7c5f1737fe697

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fecd96b6525e7b67a0388508104463e1

          SHA1

          162b99c2b5d89ea61aeee5d4388f0cba2a52e4ba

          SHA256

          52ebd9283346c0017736674d08aca64707309f131269d192686ef31ccae05f19

          SHA512

          c48eae06418cbde07de67cb1d2b4101f25454cd765a42042d8008f536b07f68eafb23d7b11e07c6d3ff7c9d0b6114c947284c538e55261d9d019d3d2a73a6429

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0fb63001aa6cee03969956e998fe5ade

          SHA1

          5a2e8acd843de59469850f2f4172c2c89fa378bd

          SHA256

          7c2d03fceecfa0208c44338ad57d32894e65b34fff8ab51fc227b090cf2783ea

          SHA512

          4be64c02b6eee3b54ada16efeabab82cab53573b28785af7164bd392cec3a724d7870369f3963c8f835da539dbd77a32a60b389e17b0cd96f889a76fb31c7544

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5d01e28cff5c2d4a8b5f16a114adf17d

          SHA1

          d0ffd49f82d9192b0efdd2dedde79393e1239986

          SHA256

          9b3b3aff6774395430bf7a94273bbf08309ebc8dba2d0e350d058a22ebde6ad2

          SHA512

          278b96565b414c37894e0afdbf9bca51dc1c9a1b39798c6e35864f8c108d6443ee4afa8bb097f354f4a277765a49fc177c00ec1d6f5ef80cee1ec66f54efc1cb

        • C:\Users\Admin\AppData\Local\Temp\Cab784D.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar7AD4.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • memory/2524-8-0x0000000000230000-0x000000000023F000-memory.dmp

          Filesize

          60KB

        • memory/2524-9-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2524-6-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2576-19-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2576-17-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB