Analysis

  • max time kernel
    136s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 21:10

General

  • Target

    9bf12560292b361276b9a9697b1ba314_JaffaCakes118.html

  • Size

    150KB

  • MD5

    9bf12560292b361276b9a9697b1ba314

  • SHA1

    e12d3ae1e2201ac330dd2a9994227ff354f68bb1

  • SHA256

    73677ef1a1c27bb5af443f193185ad53c2b22b0158f139a6f143028259bb1825

  • SHA512

    54aca5fc5519f24f0e56826603cfebdd7c6e67be8e0d5fab9ec7d9f48d44cab9e77ff6939221666b9654a3a9c45711e53fbd06a7bbb48035c29494401f460209

  • SSDEEP

    1536:iQRTm05X7fqGSayLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:i6rfJSayfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9bf12560292b361276b9a9697b1ba314_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1048
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2244
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2936
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:209935 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2000

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c1c89a6a1ce3bfd35129e539e0b97d9e

      SHA1

      e9e394bd41bec136732ee46177f52b09df106196

      SHA256

      dd647dd2df74362075ae122872f6c2b3eef184fbcf6bbc59099daed1cc036279

      SHA512

      fceecd51f40f0dfbafe9117e97e2ed2cb0b7134522d6ce4e0a3b63f4da9def37fb2811fda83401ddb1ec409e48ffbb9dac721deac1b0f2a85c28f1cdb03d8fe0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c28872e7f96a8bc603d16e0d811aceb0

      SHA1

      cd45a5c6e2667b24c383bbafb1bd4f774c8c600a

      SHA256

      e21fbf0e0106f76d8dc3052518048aa28504d713084920dc13bb237f4eaa0534

      SHA512

      e471762be3ee97284a41b32e18a1907fe8b263654b9fd2a4390f5a87578fbb5aada13e3c149bfccfd382a5042c3ca153939b8a30249f299a7d667bd2ea27554e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4ded274a93472f9c2fffb7913f4de904

      SHA1

      abafd9e4249edbee34f9197c50e28e24037ba812

      SHA256

      ceb1d345e962b2b954dc1021cd3462bf069662bf7b3af9fa50347a85a81d0ea5

      SHA512

      120a42cc2b143b592160065bf5fa16ef5910903addc984bbe2ce27c3bec438b44631557a398a1ca6c081cb7edb230a0b1eef4e2d060d48960953791117252707

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6600e10f73e61953302d1b144c868d68

      SHA1

      ad4c15135efde964f64ead54722df3bfffbcb5e6

      SHA256

      87439f7110ea7ef94090b365f9bb65129dc3ff176879e44bd45b212797bb1909

      SHA512

      daba324395d66686ee92dc3c5ffddfed2b06c9db5a4a3cc1f07beeaa5fcbc2ba5c83ee017eb17d24ae912020c612f722ddd1e3dbc1094b4a27438603aea5d6e8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2aa94fa24c6b2de2119b5d7d348448f6

      SHA1

      589d0eaf95007575cd7ce92c96bf2316231b11e8

      SHA256

      e2c8d3a7ffdc4f842dae71a93c3bc60339aeda0558f2845806c2cf77b7520e87

      SHA512

      7a905d90301dc7983e27ecec6045c7c557e7164ecfc16c9c5b9f96954487f2454791cec13973d2be677419b01a2ec5a4e729ffb7be97d8895b60458c6147b64f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      455c4a2e88f7ae96ae3722ab38957da2

      SHA1

      9626bf0ded28aa6863f47d24e966dd59a7463410

      SHA256

      94f3f2ecc0ff39b7e38d3d82ad5cbdcd10b554c0e8de3dc1bf8bc0a8505514f1

      SHA512

      2d7f04b0358b93acb452247bc3549dd9338751e4ba92c112f62950233d42b48296e74a77b161f2120099436b70b15bf86cf4205dd35456de4d547349fc45d7cc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b6050767ff7c28575eb72c1cb17e9080

      SHA1

      2e43ca8c7258c16f9e3915c892c20e34def449ca

      SHA256

      1ded09f8284208e152c5e4492a2eda8b1e849e82da405ed58eaf73e1129d2bae

      SHA512

      26db848814ee368d5f283ff0adbf1279191499a3075f9bc365ce119d22d76278e99a40ff089eb2ca7561d4de4f8a84c5decccbe517678f0ac566261cbcb1526b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      80b3c5beb25c91056feb7fe1ef5e84b4

      SHA1

      cec15052f2591c6468f88a34e0b1a4ba5bef3783

      SHA256

      7869d73fa9c96925ff3240c0f981cb64f0b2e9f2a73946240671235eabd47e98

      SHA512

      fb39ead8db5d88a27516507739de20890f5ccb757d57b7de18ed772b70714db682f5d03a84f56293b3874b02a2b5a3433c14904e8f35a62e4e9f7a696dae9e7c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f734bf1e449e9d38712460d1c7fc9c31

      SHA1

      20bafe6258fda484b120a58d6465ce90eb997a10

      SHA256

      b3e4e7674d7c134b341fed12b838306f6705f265169c8c5fdc4f69d8430161c8

      SHA512

      f2372b46b0fd3207e292b3d99a0cd9761875e78bf421a47883e707d58a9f7932ea8c39bd0727d3470dfc79267ce7a1b1595fd43b849a7ad582a1341169f987e1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e534c2a71db0de315588cfd82ab881c2

      SHA1

      5ffbb4ff07637914f140f2cc7bf9f6c1fdf50c2f

      SHA256

      ee8228894363280c3f773d34058d3f80487c3d8108632c07f98f8cc4395f0e3c

      SHA512

      da1a87f89e64d18924b690293c72ae9e3373dc5197b3f40810a6a0cf2070d4651cbab093445ef810b4ede0939ca9659e9bcd5cecd184ecf96d292e3cd45c973e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      baaffdce604ef2301d0b98a5bb792d36

      SHA1

      2864638237e9df501c0caa92f2b99c57f621fbe5

      SHA256

      908c8cd97bdd67ac4469d5e8e0610e7092dbb6d9ca1c85d8ea0ec215699620a7

      SHA512

      740eca4af7bca1a35de3a8b8b09a575801dda30e2ea97169aa439b860e095c091b13d929b897e16ecb37c02dbcf2c74f957791564ef4084b6410515132ae93b9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      671f8cc1fc97c2b9eadd98009c9a1b41

      SHA1

      c735cf759376b58d2b39cbf94fd863d8b04283a1

      SHA256

      df783a90078e99c9d8b26b23cb980c6d86ab76a42433c73d0c93a146402d8e57

      SHA512

      475e573a601043e8df4ee4bdf5ccce7af1f347e7e4677dc83532ece56020af5fe751feacf79bc8ba559b14faed49a3281cc64451c68b62487dab7bc2f1befe9f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a7f82d5d3666d9380a435a186a92afeb

      SHA1

      c0429b73dc7cb9c3e1c95d5f57f33a49d7e02f2d

      SHA256

      4527c6f00890cf052169ca78bfb9d7c2e2d7d6c8166a0db05761a2743e585d94

      SHA512

      18c7a7a1c6cf600bf4fae242836b6b68561bbb54504d2f30c72befc008b83d4b55892a8369c1f33acacd4357d7ac94c589302bacd14e8e63b840ab940af443ba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      41092518086e595729767291c39381ed

      SHA1

      6007830a7b7388ee5fef1bba2ed37bdb70d45e9c

      SHA256

      b81bd36d8bdcc548b144976effe8c44c3eb9322cd59beaf01adfd27cc821a9a9

      SHA512

      e8a4c08fc9a9c1c5a44f190b3a5adb1a6920d62b0226a8b75a8284d169b73522da45dac382a0a3c83abcb89d21fb3246ee873becdf917b462ef2dae32c944f4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      938fdca4b165fd578deb0e0978c748bc

      SHA1

      7aed8a06bd5481ef1d0ee516dffba4517b153f9d

      SHA256

      74763783a3db6b2c981f68a5365d5ae6fe0d02990737904902d1b965a88eb56b

      SHA512

      849939d8f83eff85049e8ae286f91b1672556d27008795086847e8e31f92bc4a1b93618f76e14c149e7f20390beff24398bc122031fe57af526b2abc20c66866

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1adb60c43d9356e3a6847c774ae03163

      SHA1

      216299d6024c507c3520ea6b3ca922ce5c9ae657

      SHA256

      608bdf5a56104cd4b1f58854970c91738872b479561a40f1764cac0251a330c1

      SHA512

      6ed688d88bfd15024c3bb696e81518d09643975f74aa42a05b0568bfc42bf698cf12fc56f36abc398d74eb497ccaab28f9c2388068d98d14304f2e3a33e9a9c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1d795f864810c01e31855185c6c35c26

      SHA1

      1ff0abb0a7cf33c260dd0a37965755b3b075c5f1

      SHA256

      80d4addc688fa2c2a39b03f1f7b9216e74e1e18ee91d546a66dfe29de855817e

      SHA512

      34df82444f6f291f268c37f9f8596616e34482a4c5ac367e213feaf5acf03454c4dad4f69fd92f5c9b47623b13359f5370292d9350b2ec6c982b1420d1296702

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b1bcf4b2fde246068dacff4bd4a2c454

      SHA1

      5e58c59077faeb6f476f12f02b7de6606c15c928

      SHA256

      1625436694271371eb15380c0c1ff4bb588db6b665ec4e3e237dde0ed4144a23

      SHA512

      7abb6168662aab7bef7b41ffd09abefc4631a763453a6f6bbac8e31b40da0565fdfee5084e6a9c510588f6d7fbc6ee6df280a1a68ad851bd928fb38bd4806635

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0f0647308271e91b0c981261e1140f79

      SHA1

      660b9b8f01e625488573e2c6b39893d60d79a86f

      SHA256

      9992993a21117f16d67ad75fbf69cfb2e871a827103bcf9dab5314a4a196c84a

      SHA512

      48c4e21ab0f5f7bc72975a26e61856c16f91537c60b7ff8f2d5765a44178086426270aa626e1c39517cd04b1091b9efc5c4634e7026a7c55d0aaac740072be35

    • C:\Users\Admin\AppData\Local\Temp\Cab18B1.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar1992.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1048-483-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1048-482-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2244-493-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2244-491-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2244-489-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB