Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 09:00

General

  • Target

    a4bff60e343ba2ba8b2c020a80918a03_JaffaCakes118.html

  • Size

    158KB

  • MD5

    a4bff60e343ba2ba8b2c020a80918a03

  • SHA1

    558afac40ae2808c180dbce133f099d6cd78c439

  • SHA256

    d533d2c7396fb582dc962f551cec8c906313c2c3f505b1912faf27b575f69b05

  • SHA512

    2d1dad43f57e10e2401d1a900aad9eaed637ef0809e285dc171b3428b7354becd06e35b2233bf94edb563b25d2fe1703645beda41e68934597e8e5592aa02621

  • SSDEEP

    1536:i3RToSjT+N1/iyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:iZQ3/iyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4bff60e343ba2ba8b2c020a80918a03_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:896
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2012
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2332
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:603144 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:808

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      454889353d4408340b2b0654b0df82e8

      SHA1

      f3c395cc1b9519cfdd338373808f70c425bcbacb

      SHA256

      5f98d7f4cc655f3c7cd7666acf1a8ae494996ffb64d453879e4f2433acf7fc4d

      SHA512

      a355e688c1cef26ac8e0c170e4c2d4ada45446524333ee383b1e490951c8b8aae67a6563ceaf50efd07d58fef3b0430252b5c36a485f978d8e5886cf683294dc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      daba90e195112201f3eaf33487c66290

      SHA1

      c1a9f4ecb93724ba6433c1a5825b374867c960b5

      SHA256

      2e8cca76dd4a1eab4745ff0981470361cde52933bde3cb0dd8ef5b7e5df11da0

      SHA512

      5f1ca7899b8adefedc520bb7ad4b536c1f69be1f2e9d4c72da09a973d51db88d9caeb56c1fbf4e2e1e1c4ef30d6d1e7c044c56e13d1eb9d77c1b351dd5e3d142

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      cb18140e0f1677362fef6355d0ce0147

      SHA1

      fd586f725d578dc84b2fad9d2b357130da965fba

      SHA256

      6d122c6c1a69297bdf04386f75d3034b3de69ab5671b30018306f8788873fae1

      SHA512

      a15ee09f3c19cc5e4e6f3a51e5616684f0030a9c2a8d79d0ad0f137846c40d50982dd1e380ca0ffe912cc968b359778adb1753ae9591ff8b52c0528a80c83cf6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      536c0c8bc46fe947385127ea1418059d

      SHA1

      801ba162772633135d274e13f47eba7dea35d25d

      SHA256

      10b470a57885979d4d7aeda217327225116df0a3afe0c0be690cf5c3b4b6e35d

      SHA512

      a3c393116f04c70f74c1388c80190d93431fb652a7163fe91d17d50fb40d85534e65ea53fb757923f47e23b5f515e280ba7915db67edecaa81c7856402f7773e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5d07e4f85d7a1d0f856a7acfce1262f0

      SHA1

      bd7eb1ca70eeed1e09ab145f000f3c3506fb39b1

      SHA256

      73a22978f201bfde02bd7bba6d85b52f8828f8b1b1f3aea1cec50abb0f048570

      SHA512

      734e69b4d45206628c3a0942e9f53bae73b2534c361545a2e4ae153ab96388a2793f07be5112e2e24879651f58e6601c62ae47cb530b753b29df495a4e8e7964

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      de64e1d480644bc10b2f48ce4d0665b3

      SHA1

      6a6c996bb217be6a84be4cc6a3207e99d3a76d59

      SHA256

      8b909f33039b8eea8a5023dbe5a6fe13ebf8e01f152534e0b7a764ac13bf6563

      SHA512

      f46fda8abd0732b8b138b6cfe4d8f5380d931d132f487621dde7854ebf55a334c61a9a6f13b992fd690964a42ecdbb4de1d98e173ac549863c29298112c4d3db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d0e25df4927598d402971a85fae51412

      SHA1

      676ee1fb058b682914fb89f29a8eed80db361b26

      SHA256

      b001e645b3cd73c63ca83d3e95fc2d9b87ceaf9eb08e11b3371bfba102c8de63

      SHA512

      e39c6098e0e13cd340f9b3f32d9f31aad5f18e00df91bc78f4d88b63234105f324080a3e7554b9cfc727d7520963d1097c038d2b90ed41586103aa9f2b8e762d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8c449b37d50eae5c2d2fabdc4bc03aba

      SHA1

      90d505857056c5828ecad1cd35453c83c70cfc60

      SHA256

      09e2d858471c313145b893c74a737beadea612c436f69b3c4cfedddef7bd5c88

      SHA512

      5ddfe96d39ec4dbfe6aa7efc1d2c115bf40a72af7ebd6b3764e619d6c587f8da75ee259bd210938db15b422c646c6e8f0428e708607a4c8ce94e97e85a80511d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e54234a32521a67c2c63c367d30907f3

      SHA1

      bbf36905be5a617633773ff7fe8069fd151ad643

      SHA256

      35d38cf5cec77f521b19e0ea6fa69e1fee27720690ae4885a1937166451e08a1

      SHA512

      cc29a2c49343b1f9e52de2e88296b548d35654952364541e2d4448a9e4b1a191c82491c18343396f5c87edcced6d01b4181e965e240c890dce34f0c960b91903

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ef1956d0397387bce3a0720b61319d40

      SHA1

      0f2cb2e2a77f708cc8eda760bd342fe9b6df953e

      SHA256

      e9e78d27243f646dfa6100e8fcaac18a1160b87db4016273e52ae6b356139f0e

      SHA512

      cd27eb3e60552751f9bc1cc1fdc70c48aa3eed4cc1ff3d01ad1011984dd6cfa05135087b23943ad61d315fd8a4ab70aa894b5a1b717e9ecdd65b5d3e0f335669

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e0819ed1bd39b6411e68f14ac0ce7b17

      SHA1

      6f001fc40f256e48159a4987f508046f51fa6c3b

      SHA256

      ae4f400e9a28ea0b9f70b474a5fd7c219dd3fbad2fa18eb6cae6b4137f4cc834

      SHA512

      21555787be85c6f8ad45e48e484014d4f58c59857b01eabfa0299d344773f89e9d0241cf5ade3aba4c245f3549b3398ded6680ef12b0fdf6b34848480e912f1b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1a0905698c93ea51121101c561cb2e23

      SHA1

      eb24212bfd875384a3e8a5db1a589c36e37bd3b5

      SHA256

      7bff837fe10ec1456f0c899568d0ddc7ae6d6a0a711843762f681d25584ba764

      SHA512

      2ca7a416717226c58ab41d383271053d00d4b9a190d8fa90dd431413c13d669d7cd57e6d382f0e37328038329fc214664dc3d9d19e98d3d123a6a8ca8d220a32

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b99b47599cf3fdff71bc5be3dccc691b

      SHA1

      a2ece89d912be1d93a642be4484dfb02f02105ff

      SHA256

      066a2755736f7fc08f3d7fb0b780e9181a9ab7f3f6192c5c32b8b6d37a4e8350

      SHA512

      f647b2cb394a566fa3bf9d8a16063f26fe204eac7ed6168e9297084a957ca3abc53d1238db585814809c606e9a17c6454e160c9e1c4a30f24144aef13c406e86

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1137fbbcc0be48b1d05bd7aff0ad7ff4

      SHA1

      288da62a38e0992ae983ec8915187a602a8f5561

      SHA256

      fec1f5ae39ad3c5949ae9f6a0d1f001936c7acb46fc55a942054cc0c2eea3dee

      SHA512

      4e5e078e0e682e13b1c218f2bd579ed81900d7519726fb1eedc87cd69e3c871c34e294216bfefb849cb95931a590646efa41ddea1b708ed0ec57090f1fdce907

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      11e4f2007b9298904f79b756f107d667

      SHA1

      06ff8a6dc78db91b4d0b5ddc7bb17943356855c8

      SHA256

      dfcd2b1c15a8e340cb327a83d1fe28f115f2cff9b057f51c08c5f32213599289

      SHA512

      a45460ee15f1934c857bf492be8535ea4657b9cc262eaf7c4e02265c3464e33a55e436b2aed91b54b08a7dc50a1669f08194452be45697788d90269ccf2f2682

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c2e910e63d685eaa352da1c789dfcfde

      SHA1

      cadc5c2df3bc54eaabd878fa93c7bd0965a0023e

      SHA256

      33c75f7d3192f7fcb0236a10341c1b03408376422e46d8031962527e8ffcf664

      SHA512

      01cf3cf3f88c5b46e35b75b481e9f9b226a7f538cf8bdbcea3bdca5fe4bf23d3264c4fbf06f8fa5bcb3f46fd87d96248e9ecd03370e917b13438794fb09f682b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c738d3320d12bd34138155cf6fc1ea5a

      SHA1

      13c4ce63c470b45d3c4dd5284d41843675d0493b

      SHA256

      f32d19229fc077c1e48ae6e74b4066df71827112308c8c86a1ee287aefb03a6d

      SHA512

      0cd7c1ed28215d54f9eaa2ee7d32a458b8f8afba3069d6867d4249c53c5e97b711e49da03b935dec9358f46269fb1e54ae15a75edea083d527bd094163997236

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1758304b8876e62614e14f2641eac20d

      SHA1

      c22a39fe4bbe68ca7d427fde2dfdedf20bbc9dc9

      SHA256

      d8761ed7dc90d9ecca7f1d2eaea8d4cecb475c346918da5faa5d206fe53f83c4

      SHA512

      483ab48cf7d723384c83372a1507c4076deb04660613d3c04f060f051a41fc8a39e9f21edcc32b2d4071273393b06cca4b524fc1de174ffc1595dc238021e436

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      4bb6c305ed1e9727bcf9471f44b53e8b

      SHA1

      aef4443dccf05c4dd7d68ac6cb82c4ce12c3007f

      SHA256

      f3337a636502c74141fb12c0870a2a372cb0106b923c2754e282017130809403

      SHA512

      7e39e8c50dc5edc0b6f135dbb69b744015fc7e08d724d26c5473f1ee8725bd3abe48e4963ffec3028f863e7dd17a9bf48c36ad44146868dd26c809f5e0bd5f37

    • C:\Users\Admin\AppData\Local\Temp\Cab14BB.tmp
      Filesize

      67KB

      MD5

      2d3dcf90f6c99f47e7593ea250c9e749

      SHA1

      51be82be4a272669983313565b4940d4b1385237

      SHA256

      8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

      SHA512

      9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

    • C:\Users\Admin\AppData\Local\Temp\Tar158D.tmp
      Filesize

      160KB

      MD5

      7186ad693b8ad9444401bd9bcd2217c2

      SHA1

      5c28ca10a650f6026b0df4737078fa4197f3bac1

      SHA256

      9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

      SHA512

      135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/896-390-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/896-386-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/896-387-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2012-396-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2012-400-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2012-398-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB