Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 14:18

General

  • Target

    8e5cff9ad014e6cf069962eb39f39369_JaffaCakes118.html

  • Size

    347KB

  • MD5

    8e5cff9ad014e6cf069962eb39f39369

  • SHA1

    02e9b440bbcec9e7098006dbce589eec738ab582

  • SHA256

    0c8999c537c0a3fefd1b9c01a98f16b467833194798fde7bdc400535121a8e4d

  • SHA512

    8302261188f5a9e0e809ce3bfba7f352a22c8774bce113c7623229b45c188ae8735f56d21c14694d096c50430e4e3ce3b70b85284334301c6ff50b69c718b5d9

  • SSDEEP

    6144:/sMYod+X3oI+YiesMYod+X3oI+Y5sMYod+X3oI+YQ:D5d+X3p5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e5cff9ad014e6cf069962eb39f39369_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2432
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:1876
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2892
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:1596
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:209931 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2532
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:5518338 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1216
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:537608 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1856

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          aa3a659bb37ee0179a09d627ddee0a51

          SHA1

          f644aa8a04706361cf74fa2eb7a8eb2939fb570d

          SHA256

          2f6ec6137d3506f75098f493bf965fee6e1910df817378bd93080be1c23c45b8

          SHA512

          32390c906935ea8598a59d217160b5eb033debb72f129e95bb4116e1264c2c46cd2454dfff5b78e5cea00646b3c18b6aaa17e35398610ab4afcaed6ad2ed9743

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fd70220a404a28aaef9e33855ad485d5

          SHA1

          c386ee0afabd4b40d124683fc3b82b5fea9a19da

          SHA256

          bf5af82f055dac17c4ad1df280b1c18735f00cece1142878aa6e218e9935873e

          SHA512

          90a1469fd94715bc5fc50cc8711e02b643259a3a63215a7e9d6b0403518838909d922044f24679ed9480cb0434588cfe62740aeb8a3bb1eb148dc907679c66a2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          de774018402b7c6d1ab6ad247721f678

          SHA1

          054ea539698ef7d877e988c6455f89fa81ed4199

          SHA256

          693bd77a408b4d1ec8656307a4cfcf977f5eda2b9818457ed6caf05368513fea

          SHA512

          ff8603cc8be0a3a78074417d18cdf333743f612d544f420c7af9a69aaa056b5045c785efdc59c25ba83aecbbddc1e08e3656838fc22a6420b64db0a0cb714d2d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a9682c95372129c9ee3e04f0a967ca5b

          SHA1

          6a8f553f1142058d1b8ace69b3c4c3e0794ead46

          SHA256

          edb3d37798f30ddbfedc0e4e2551c6c4bb7b95c1393f2efac208c4a8415ea130

          SHA512

          e4d08c3b2dc588a9694eef1ebbd1416cc053931de9533bf2656d77d625fc4d7f80bb6c16ce2256b718fd458f2ea73bfcd2b2e04761957b4515d841e900f806da

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4977f4cc8ff556d0c194b9b48a8cdad5

          SHA1

          410d28d26559ed74966f27dafaf232fde23dd60f

          SHA256

          50f39c74f2b93c6f0bdde6ae3eb57f52ba8efcd5f1cbfcbc41ed82fbaf1e4f97

          SHA512

          559b420ecf98ebeb5b6f25656bb2de964e7f3d0d438396dbf5c0a5a58c0834953fa35922ef8b13b01c49757d1e2d0ffa1c953651cdc1325a83e4026bc216659d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          cd12b3ce4f899ccdbaa22124cfec9fa2

          SHA1

          0856e746a41962c86f323032e14ea5378e840e17

          SHA256

          4bcc16bc57bd1c6f14cde95ef466c9a2d26cece14085c653648572c429167cfb

          SHA512

          e950a42fcbcc1684d9fde4d9b75fb3520832cc9f9da0dcac68490c32f6246c4ee78adf6033334e191b05c24e588cca5ef97d389845f8c73bc3d0eedd9a43a23e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8dbfc243634f3aa8409cf2a80b1f9a04

          SHA1

          525bb4bf50bb1f21d4294cfcf7f4b35c0842335f

          SHA256

          d2b8ba6182c1bb1fea0fee8d7a4e8712196d0ba1cf57322f0a120f586da001db

          SHA512

          9f3584be736b4dc24bb8235fd5f7bbe8d6c72a50af85e0a6857d9557cd9a96e0805a71d7a8e0f4f7e1a77f8a379c42fee71c2fb5f55e495be369467684fd39f0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4c7331bce50ae8ddfd1e5414f14e61fd

          SHA1

          8cee4499b784c4b0de06779c7ba7e7ebb7a1de64

          SHA256

          5e33a22af0bcb30103f04790bc682a0b75d46c8e295c03ea0bd474f4c404792f

          SHA512

          824bf38e61722e67a07d98f21ffeac7f7648696de70e18f73da79e92e07c65b7ebf6e55208efdfe8f3e450e73cc8fc347d365e6befc69991fb9eb7c905de3a1e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4f8ab9e2cb494adcd1b460e4c5e9fcc9

          SHA1

          65b3b37ee8f1e9a0600a76a48a4d627693fcf14c

          SHA256

          d462f4bf94110a997ef80b2b57e0a1370218a62fb223ca48ee774d45a9141320

          SHA512

          cecc8ef32dfd76b84cacd2c5794c4273db5caabb7779fe6c067ad7f5338ae7722073556c4af2b2aca4e344f38826aadcf31fa6eff2d73b44f475d5d72ad0879d

        • C:\Users\Admin\AppData\Local\Temp\Cab1103.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar11E5.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • memory/2416-23-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2416-25-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2552-7-0x0000000000230000-0x000000000023F000-memory.dmp

          Filesize

          60KB

        • memory/2552-9-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2552-6-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2704-20-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2704-31-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2704-19-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2704-17-0x00000000001E0000-0x00000000001E1000-memory.dmp

          Filesize

          4KB

        • memory/2892-28-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB