Analysis

  • max time kernel
    136s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 07:50

General

  • Target

    a48062cc93ab24dfd737d339af036f9f_JaffaCakes118.html

  • Size

    132KB

  • MD5

    a48062cc93ab24dfd737d339af036f9f

  • SHA1

    c2788d25ea7338feec3d6b5fcd4a4cd86ffcd27c

  • SHA256

    fcec726c93531b4b4e04aeeac186671a1ad6e87c4922537cb4c8fe7eb7d80d1a

  • SHA512

    334a5641ad8e842d6751fa1188fe934468d01ef73cb0283fd37cd4b5fdffbeaf46c65fbe31dee69fb5668ef040591194a4497f04f7c3af363002ecbdc86baef6

  • SSDEEP

    1536:StitqpyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:StitqpyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a48062cc93ab24dfd737d339af036f9f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2068
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1048
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2504
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275476 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      42db797bf36136a2bbb39df7097d7945

      SHA1

      e1c6b2dc8ac60fc0b269859c96b7dfa68ebd685f

      SHA256

      da8f4ad706005c9e1451b896ef176de04666db75e41ffbcd128743b1df2adef9

      SHA512

      101ee562aabedb8ae7a5a9a5620413032f72f34c6b51be7ced0782496a10babf796fe75fa44364e51c590fe284efeb137442472535a2e7daacc534e90661ac12

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3614368dc8ca6f7afb489d8d7c41e035

      SHA1

      f45e137d9bb6339a12395bba683b5357ca570d6f

      SHA256

      c39ad7217d065604cb1aafef8cec35ea75aa3d16b386355c72824029994659db

      SHA512

      74949914a5d4762e86f7d8c4ad333fd4a608c6020e31346eb8eca2e5c4acb0363b251dd2d6589627fe7363b82589ae4d827495ea78d0f80f040a480bc1017b72

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6c14a29ed631d68784890898791c11d2

      SHA1

      d5c553b9bfe26f9049b2c4827cce9f03a8690c6f

      SHA256

      d026713eda510cc2d4e8d7153eef44bc6ee9b6b438a033798851cd26684d628d

      SHA512

      432760e911c4f31207d6ccc0203f137c94376a2f948486f8ace11cc419628aa9c858f527efe964a970e629e2f7cdbf3397ee7cfe05ca6cec01860554b1324a3f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      56df999093e488a302a832f3d934c8f9

      SHA1

      c0d92f51d129d12efd786231ac1a5a006f937c46

      SHA256

      18826a374de928742c841a76ab1d794780ed08a2331e00ed155b69fdba51ee2a

      SHA512

      f88a7f179298d90704e869ece441bdbbe2507989dbb344cd1d24afdebc64115e6eabe2fa01de9ea3d1cc2c9fb26ad60bb3d8154d7040875e6a764744ce98789b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5abc064495368976da9483b30af03d64

      SHA1

      a4ea35645a4da4ae61723c7bf103d97ebe1ac791

      SHA256

      eebcecc7859f4cd373f5a1a803c476d52203fe9f88f4ccf84a1cc80a7ecc37e7

      SHA512

      feda636c4aedd8eae026d10fb960bcf1ec0d64a0013e0078a35af52fdb4c81933fc60b02db0993f973a41900628b0149370b69350e80b2a17d9254ccaada63cc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3fb2b2cc167f85cfbd28423abebd6da5

      SHA1

      624a73a8ab80465df35fcdbfdd4bba9b12e40ebf

      SHA256

      dc93f55d2bfed3b3bbdad4474e9de8a114e5527c126fb781f7d7619d08516ed0

      SHA512

      4dacbb52f72b1ac4f4ece86a72c6999c30a19fe6ece3663208ad22a46b5ab986e778a4f1ebd1715b103b7e8b0d4ef659e0083d275d1d8f7b9121a0a83feeff13

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b9012df106b9fb8f7e4adf4f4ecc3992

      SHA1

      d44b84c4dec6e5af1b37707a937aa3e98c50eddb

      SHA256

      9ba7568f52a471a4c45a0e5fedec2a0550a193130f25ff0380ce4816aa81c128

      SHA512

      c723fa23591316edf545cd99654c8b284ed44ecc6d81cfa2061d39bda8fd6bd179d2611607e363b441e987191acc47bc7d1a985346a4d7cad15f8db84b28999c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      efbf0d00d91cdf54fac304e57c0109a3

      SHA1

      aa59c3f88ee24aad95c07743b5c78082557fc999

      SHA256

      47c599cf6016296cf261c5bd78bfc569d06383c8c3ce72ca3decfe33546bf3f3

      SHA512

      2a3dbd17f3ee9407dd2823640385a49703c74ba8557f9bf7e0ef5120242af9f752e1b8a15e4bff72fcd4bbf4ba6d8f21b3f4b9c81ed11d25ccc92a0717d63641

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3347db3a5725df78e7bce1e33aff95c3

      SHA1

      8620baff866ac0ee71d7a01c02dc7f785ddc59f6

      SHA256

      2a9553cf4f4a854b5a048fb737479eb182ef629b81b2e80277092ed6879b6b3d

      SHA512

      50df0ea7a098cba64cfd5bc0791f8be36b11313e37a2793938b88e50de9b7983ddac2845d808ef2147f261902772d09acaddca6b5e492b795b99055873826688

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e95fb88edee42548893e38157885b11d

      SHA1

      68a32301030479dee67ac025ed8f91aedb31d5f0

      SHA256

      8f3fe5125a8f84c8bb5e548db1564672f05142754ca979c17a9363cc67768688

      SHA512

      541346d3527f1b7d5158e208c6c786c9f1cee30af7fced695d7f1ffc7ba8135c6de835b7dc6ace818112640324df2824a4234ced4396864bad2255f50545d294

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bf35a05b70084ec1be26e72b22345dc8

      SHA1

      88d5e8d39a7d2d48c73cda780e1605f48aaa3072

      SHA256

      4466d8202dbbf495300a9eeec12b3f632b95d583f370dc90debb77cedb681a43

      SHA512

      b7dd2fd40c4ba64836a662a1435326ffdb374d91b7c325c9d0846ffcad99eec4a28396e55c3f3a16135330fe692ab2d00a225e906b3cc77905300745e928676a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3d8ed644131abd33e96189885bdc2e84

      SHA1

      d4d69c33ade0d425257ff5796126cbd36764893c

      SHA256

      98b7ffe553dc2e32d485868dd9a481cf5b56846a410b3121c8078409aedcbcf6

      SHA512

      724dd8b7f71af317ada9a5ab9b2b56064f2fc776d821eaff6c04eb6c19cd34bc5284467ada1199f4b565bfdae1ce990d9c4357bbe6259b164a4cf66b1d37f780

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bc1762b4ac9a590c404fa3fe4778eb63

      SHA1

      f0f770993ea37cd7d933bccf97eecda1bffc04f6

      SHA256

      134e51117583b5ea4f1846b1b5630fa8b08e97dfcb6104ceb585452072c1f7e3

      SHA512

      0f08bac248fcba68b62f3487bd141ac523b6e097d5471c093d7d25e343f60b9dcd57b80816353b990d598507d5b5cb51817001ff79dca67538f9bdee8db36f4c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cc725efd64304ccd7840f5c2a689115d

      SHA1

      bca875667ba4510702c293877613b9325e0431fe

      SHA256

      13b3600aa97c2264dd869e56024593172c9ebfa250ced67d8f21f09cbb77cb57

      SHA512

      d0f2f9665640a9215e74dc588322c0aa19155b7647498f8b594788b8bdce84b496debb346b36e3768d8e6a867a9d3b6ed149d27a585a3010fec5c9755720fdd4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cfa34f2486fcbd6d455a022d02405acc

      SHA1

      b5715afb2295433de82d664c4bb6e8d66a66733b

      SHA256

      8e6168842f4ddb053359bbb62b0d788f39cdf540ffab65d688f5b6efb1bf6302

      SHA512

      3cb370a79b7d89031d15a52813a9e2d4a48027350abc704c7842471c7c08134e2d846d76481a8caaae47c1dd9614e96e5bde2d23b1dd7f5b0b5385bb5e9451d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f3a43203ef0975bee9bf9461d01e080a

      SHA1

      5ebe331fcf7de4a03f2c71e0ecfc3e4295a7005c

      SHA256

      e19491faccf2f4c2230911df4ac9a212a0dcf3075d9097ead4c61b52d75167c0

      SHA512

      a34bff247d784024eb57a380490091de95571843c3b0274b4c18b2dc63fb5a16c81d68a6f5737ab2476d2df77170268801476b2c3df05c91200de29963ff863a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f6193fa055c7ef93e54528178ecd0f1f

      SHA1

      010ca19f364629a6ce5e859b78c6a3ef274657aa

      SHA256

      446a2346167943932017e90cc3ec8eaf9b656433a2ae1915164e0609e359ebc4

      SHA512

      90d52988ab0508c936d51a4ef5b38877cc030d321fd2a18f7a1e649a6bbef4b6b8cce8580b6229bf99901d36ea0175571ecbfd46e52f00a7c17cc8585be53ff5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0b51b267e5ffb1f5f6133f63b3727ab9

      SHA1

      0c9d5a13e0efd6999e7c7e92243a69fb4bd06dbc

      SHA256

      1b86fa2baf99231ab8fbea6b825b916265a4d74f0e2462c9a79d586b479c49c7

      SHA512

      ad3d710fe30802dbbd9e3d902501dd811e897ea7d0cc541646322c60d4c874f7875b2ee91ac0e1a809cf6c0ba1d9a15beff06a54cf9bd7e6e8bdc0131298907f

    • C:\Users\Admin\AppData\Local\Temp\Cab7DE.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar8C1.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1048-493-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1048-491-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/1048-489-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2068-482-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2068-483-0x0000000000240000-0x000000000024F000-memory.dmp

      Filesize

      60KB