Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2024 02:01

General

  • Target

    99c43d38298af3f51a9c0dac66bbd2ff_JaffaCakes118.html

  • Size

    347KB

  • MD5

    99c43d38298af3f51a9c0dac66bbd2ff

  • SHA1

    9a19d11c4384df1ebfba378399854bf61cf063cf

  • SHA256

    882eddcf158583333f1e532702afc8b4f0ed28232ecd6e83fe0ce981daefdea5

  • SHA512

    37651468ae9843ed9076349c46e013f72073805085a7b86711a16579e27b544ac62eda5d6ac428d28cac88d8fc976f016e07041680b711b80005014a45fde112

  • SSDEEP

    6144:AsMYod+X3oI+Yj/zzesMYod+X3oI+Y5sMYod+X3oI+YQ:u5d+X3W5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\99c43d38298af3f51a9c0dac66bbd2ff_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2264
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2740
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2440
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2608
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1048
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:1612
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:537605 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2792
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:537609 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1828
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:406537 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2944

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe

          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3b1127daa90a638aa5d0d66a56360ae3

          SHA1

          f294dc15a2f45639ed55de78bcd347485accd845

          SHA256

          aeb152350bf071b94b8b650002a6220b2d4393f22218c4b9765b60ca460a5473

          SHA512

          99eea8a087f862ce2ce5f9c3efb768df73cfc8ddaf8932a05f639069ae78b6d813584c49c474ca0cc26f2c2367b9fa2b137632c1485c0db7c9ae95491192e2ae

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1b78b3fb9047aeb6e5c00017442082e9

          SHA1

          56386d1722ed8bb514cb45653175751f16e0ba74

          SHA256

          48736de150459f371eb24b101b5d0eda7e112ad50f61f187a558734f4cb95ea0

          SHA512

          5017e26832a870d4279426702ed839485ebcb57556e00bbd02e53add9671758d0c3d0eb4246db588a72d0e150e04ed20bf850fe8074c34e31e41169656cd5652

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b381f7aa8827e2cf139c31cd0f3e6ce3

          SHA1

          de21c0cd0d9d0477ac118b36a6d787c73a4057b3

          SHA256

          6af2e8350f17a665b4ac0fd9e6bbb0c6d3081704686b72b1ff9262cd02f9b2b6

          SHA512

          edb893c6ef54d2956319f0d101c80b9abfb64b4f2fc52757d99378ce9025b3430f2d15c0550b022182bb5f16ad3fc80c79cdf619c5a8d7c39dd832c2553fff68

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c7e540e2e07e2ba080e8d41dca3f44ca

          SHA1

          d28373e339a8374e8e3534fd2023b75be0a7d06c

          SHA256

          d4f57d5503f5a39da73d3d0658516c863904f25d743aae9338683d468c278b23

          SHA512

          dc41bf871606c56e598907c461006116e67a0544473ccf12e868ce3fc0a09cecb96546c7b9271785094fb5d35f1a92300933fd4e5e801e3d39372705e96c128f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          574c4d64a1caf90c98092088a2fc8802

          SHA1

          f72fe85d0d72a495d042821d94b24fb3e01cd7c4

          SHA256

          5db6f5a67d7fe2e164f1e26ab415760552e91eafcaae5bc47e03508a2623a3d4

          SHA512

          c2a15d2662b7d7c84b3ccc6af0db3febd3ed7619e01e82e87e0bb249bee6b50e0f4fe2983705c4dd4e0d564bdfad1a84317ec47bda434a76dc3b5f316d35ab43

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0b8cd8774e2fc930316a238cb147c262

          SHA1

          4e138fbb19806e2ebfbbeb5a29abc99c773d1d02

          SHA256

          3b14f331bd287f69b69e3cfefeb8119e5134867c020d3049469257bdeb3911a2

          SHA512

          7bdd5af037b1eb21e875c3092d616e92f7cc7737f972ec025baadfacc12217800780d72b27907017e3476b99a8d2bc6776d8ca42b9e63c56e0eebbda70d78f84

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          aef8a9bb525c45f3fd123c488855bee1

          SHA1

          82a0d2fe2ec7d22d1eb33ed8134b96d70a32cba5

          SHA256

          ed0be032fbed34e35cee90ccacfbd855b824627c6518234ff5c7e8a5ab45af17

          SHA512

          480c562e62526205387726376ccc5b9678222f4e8375d858982e3366bd4d88840e715c195736efa7a3e2023eb4572a495e3c9c77a707dc3afe6dcd600dc321af

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          257037370cefd320a1bbaf4df6dff368

          SHA1

          523d37df1e5c8e746a601079ea32bc50a6cc3dc5

          SHA256

          795fa674b831936d5229e0b73f9644f11f525eb36d1dbd099f830dd54f2c0647

          SHA512

          8ee2b8e72f9e91d8c43ffc6845d667056978f4fab9a1f14720f192d062d5e5b40d2f5fcd76eed73602698c051453cba989f70e3d85f3018ff3fd8d77ce42d369

        • C:\Users\Admin\AppData\Local\Temp\Cab1FD0.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar20B3.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/1048-30-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2264-16-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2264-17-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2264-19-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2440-23-0x00000000003C0000-0x00000000003C1000-memory.dmp

          Filesize

          4KB

        • memory/2440-24-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2440-22-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2648-7-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2648-8-0x0000000000230000-0x000000000023F000-memory.dmp

          Filesize

          60KB