Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 09:12

General

  • Target

    a4cba7dc78328c8256bd7c02ac958b46_JaffaCakes118.html

  • Size

    124KB

  • MD5

    a4cba7dc78328c8256bd7c02ac958b46

  • SHA1

    48eb8eb2042834f24b36961935dceed9ccc60a58

  • SHA256

    133f442ed9f07dac74e79b28403f12d771b474629e3fbb45f259d598ff574e75

  • SHA512

    3e9aa18e5cab021b5660d83c3d9346bbfd8a99b43240afaac17b0ead63d8bcd7e244a8a14e06188bfada2e657a655c3521e5713d19c4a0f3e8104ee6be9e6018

  • SSDEEP

    1536:S4uyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:S4uyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4cba7dc78328c8256bd7c02ac958b46_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:352
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:352 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2856
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:352 CREDAT:275466 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2648

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      40e935aa73247f6d441a045ec570c5ea

      SHA1

      c9c57c07885ac8f8f17c0d25aaa7c9ccce323a3f

      SHA256

      77c305a5cafa787e3078a368473ac2e7cba7091eb3654f6556e30978549969f2

      SHA512

      058f61fc4c3d9bdd97c285ab0a4db92b0a73f652cf162bcf81c93287180962f30af7b033588f0b3eedbd47ac5eee3d1832e086c3f483cba5d17072b275de0c59

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c88dad7b6d212457d5ace70b0b9c67c4

      SHA1

      b3525b667cfea88fd7af168156a4e0bcbd17776a

      SHA256

      886cde48066938f7465d2221ab266970fd8cd9f85dd35b8c9bf8079567e0dd09

      SHA512

      b1a7546fab4fa26d4a8affa81cee10d835b284956fc005e5bcd54da417a2d9368eb5ecb061a9bc5a39fcdf2467940cfe037560b6a50d606f0f16be5d9ce29cc1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a54d1ddfb1953938c72fe1c2c70c10b7

      SHA1

      a812e977bbd98f77e7c02a9e5f7b5cd4d05fb3d8

      SHA256

      287845933d211fbf0bad1a72b2cfa8da7aebe6715292c1d257a15683f9943cbc

      SHA512

      95086a377fd2e32d817f1938a294332420781e616ebbe93952480a78995ce4a5fd63409a6657dc5279ea6a846ff8c17a0a144a5a2bc676a7ad535c95d9bfa210

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2542a1fb9579c7c0993d98120ee9d9e5

      SHA1

      56bd79bb7cba461b7e1856a7f13a42a9a999ceca

      SHA256

      28b805dd4b389cdbe83d530c2d3fdd23f05e0d55fac438ff354453592e2cebe2

      SHA512

      ea26546c251319d48e2f2f65249bed5868a9b4d5baad105756f7dd2e750cb08dfe783e9f83a7cbf2b67ce50aa24ead671968209f8d15dca391fc4478a93e1d6f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      fbb4f2b87302f83ccc63f1f619fe3e7a

      SHA1

      e1cddb21b3bf27d65046cc630a7b574b7509af04

      SHA256

      3db912406af60fd8b13b95498cd36b54d4c5a8fcf7d9eb3bc3353661108438be

      SHA512

      dcf133c06f7d5e9668674959f94c45039d3b7253a85390b031b564fc37ca7630dfe9579c569b0adddd6b8ef7804af43c53b634343d52a35e10a50f45ae2293ba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6facc42937e38aee8be9158f2fc3be36

      SHA1

      ab4dcb9f2f6a8c5b71a54a78d1592f26ef957c66

      SHA256

      1e03da153eccdc3323de0d624d4f49c452dc1106cfe94d1dc825b1ac32446438

      SHA512

      64af2a55745a27ee34fd0ed1ef27b62b0af6d5e12f2733e8f539be7d040ab296aed3a69f295170d4cdd69af8dea57dba891d5b233113553a38bb4c86b41a2b1b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      53d41df59579199be95344d877cca304

      SHA1

      bd5dc31e35a3067a6838d6d7f2799201585bd73a

      SHA256

      ab42dd4d235a2c841a8f31997585888b2ef00d730b5eea74d3a721c120819692

      SHA512

      599e5433fdd4301c6dde15d9ef6e9628c8544a84d5007faa199335e1a34229084d35f28479b326a2db8bba4e156bdc0d92c30783e1fe627ed7caf0a3ee7278c0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      69555bfc0fc4ef2befc08ba56863def5

      SHA1

      4ff2a5baf9526d096547e775a94ecc9ca25e1923

      SHA256

      8bcd3bc665ebe8314334f119a540c29fabc5e30c42b6ead7669dfbbb3a558891

      SHA512

      bf7b4d716846f1b87877405b8acee811db91a596acaad3f2dcfebb08b5c57fccb767d687d90a419545b2db3c40a3f50c98ebe8543a272eb40e9bcc6a70e3d419

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      fe39f24524678f67a6f5cbd0b84ef223

      SHA1

      eb678184cc241a2b50175e1baf838c4e6fca9436

      SHA256

      e2e5603be4ecd7e78d0a5cb62361d47ec5ddac792f1c3d95f75fdaa57333e14b

      SHA512

      4be0980bcb9fab5713db95973a34e525f142619537687d31389e6e7a1c145a6c5c71876857560bb46a38480288ad516039d466fed1c30574188ab86fb2c7c92f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b65b3133773c5ae057f32ae335ebe2c4

      SHA1

      4f038c4a736fcb560a91dec910a45aeed969e83a

      SHA256

      b2ae1dc0d6ffcfe2b4884e6225ec0c57538ad0fb490e76ac5cf5db5d62e7d03c

      SHA512

      c48cb129de62595ec9d8aa3a0454258adc0b154707b72fc9ac2ec5b97465ef519f98649703901d8585876443563d5180307f6bbbe88b54699b46b1a457db5cb6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ef593a4fe2c33f06dd228b67a39860be

      SHA1

      691f2304668df5dd8347752185bfc22e7d1ce094

      SHA256

      42aed6dc28de3a24111182285c9166cb92f9c66c5b227907a95f2281ed9d0f8d

      SHA512

      c819ade05efca6e4094f7741fb85f1325000d49cf0d0cfce36e93c1aa37e785f2d92ab3c4c53d0e5a0aea2b4fa4123d6467ebe997bce969f59da0c4106ba6dae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c75c4a49dd5967417c62694c295497a8

      SHA1

      2687c1db00a68c7c4c7fbd7aed5d5a3ceb9521c3

      SHA256

      a160038f231b63b6714abc2116ff955ac890dcc11cc70897bf908d96220f6b07

      SHA512

      8eeb30fa7d564c514c1ea902bc14a34588aad7732111b730d497157b8db05afa7b3c118dd3ee205f016f370598ce20d83a85b30d839aecd2e54fc135ae89dad2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f9b1f8bc7816d08fbe9ed91d53f7c44f

      SHA1

      871e4206f0fd95233f00e919ab08dceeaedd4120

      SHA256

      3b02bd4725eb94a78d3613d20202fe04a5e5cc4b68385bf1c50bbc4a14b572f2

      SHA512

      cf03bd49b0883ea1c60d757476a969c96ecea5ce5b5cf4b6d707cb448b55979765f145d2b7c38b3707501d22ce4dbfcf5b9ea5b8e55aac95e9a9a5673aa0ab9a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      40bbf57cb400feb6ae4aae5ccc59c17f

      SHA1

      3366ee5afb085c412b35bded2138ad98dcc31ddf

      SHA256

      33102363e0a6d14ad6083e92b5ca22256df8e1d2cb8b52b2a49e639610fdec9c

      SHA512

      df0c53630311654fb6aabe3a7b40d0febf72898ec690d791fbedeffffb1d4ff0cf743a10430b357479b7cab2b3381282e9ed8fa29e479bcb817ac818d237fa82

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ece296e83232b14c4fe9feb914c6d84e

      SHA1

      84e68e2c097b50c948efd01386f1bacb05bf8385

      SHA256

      bbdd0a4314c44fdda10644acd78766de2fe14f31b064e19178e37040b32bddbb

      SHA512

      2b9e63cd61e54d5a19d9516fba31b3c507637ced44b6450392b835a3891c6c59b66142faae2bc3eaac5dabb9fbad5e94388a69149d9ec55c6183eb6689c0c971

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d9daf8e1330fbadc94d769e2ddd73acf

      SHA1

      7787d78b61a27679b876380079a4b9e4e651c788

      SHA256

      d252ad7d6d08786b5e096360276db10bcefd94b78dd0c8059091ae7fdc626532

      SHA512

      ec89fe27d12c8a691eaec93c88a05d3f0662f83c56183977c075dd794d9b17d873e1a90fcabdb398dd3eed260d2e1c0f348dbb566c2e9883abca50f1b53c7762

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9b7f55dfb3aaeb9b1a404acf4255b3d5

      SHA1

      2e169cd2b949adefca0cde86c3f0ffc8bfbe9cbd

      SHA256

      698d403786b46cec7f997bce0d4f0debb060f717d71e99b2f52ab02a61a25cfb

      SHA512

      df4d6c6efaba7c3c5533f441ec43b4689bb04dc5613f8150b5ffcff9b90fb7a6e01fb09f68540f9770fd66b8f20aada3df8275b4b3d804b14809e919bb266030

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      4188365d66be87022148d5a4745a45d8

      SHA1

      5f2b833ae8f9c797317b5c5a469ef9ebfd3ee03b

      SHA256

      ecee73522c8890bab07d2c5a7d20538a9af8ae97ea0722b0435347c363a4533b

      SHA512

      3c090735f335e9fcd9c7a2eb8c296530d7db3b564f34fa3375052848431f8c389c1b3c9571327d0608be9fd2af16645d108f98032ccf3ccf5e6b1db944964fd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5b9d4e82212f358453a88af9bc8aaecc

      SHA1

      77efeea103cb2754827da4dbe9873147c431a48e

      SHA256

      8e7cfa52ce622eec8a4a480086939e9aa7eda503ef9738a99c4cfbe5eac5736b

      SHA512

      cdb12ecd0c2ef2719255b981fdb68773029a5a261d9f1c6505b31fdc5a5a8af8929e9e6a572acbaaed269aa8accbd549b452f5fb0141ba84730957a6a972ff47

    • C:\Users\Admin\AppData\Local\Temp\Cab2465.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar2504.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2404-6-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2404-10-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2404-9-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2752-16-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2752-18-0x0000000000250000-0x0000000000251000-memory.dmp
      Filesize

      4KB

    • memory/2752-20-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB