Analysis

  • max time kernel
    131s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 10:00

General

  • Target

    a4f7f4f8ee0e86c1d2f2a5663707303a_JaffaCakes118.html

  • Size

    158KB

  • MD5

    a4f7f4f8ee0e86c1d2f2a5663707303a

  • SHA1

    cef60ffe0b83f8af7836c9bc04378f9cc1dbb44f

  • SHA256

    cdbb0145eb400d80b64aea0ec937f80c0427e0fc4d48219ac5d4c689fc757e19

  • SHA512

    28eef4205bba31115258344696201504abe4c1f0a2b76b07128fc3d7f1b66b38dc9340bebe44efbf9e0b929cc96c54bf318a507678d09d6fed9a4271af9237c7

  • SSDEEP

    1536:ixRTsc1PmCPqjfYR5yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:iHXxwfc5yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4f7f4f8ee0e86c1d2f2a5663707303a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1360
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2352
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:904
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:603146 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1704

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      46250cf886b84ea68e0c606c49134a18

      SHA1

      192ad70e3aed26bc59740448b56d8b62661e3959

      SHA256

      3408745ea88d33dd6c6cb95c7da659fd225748954537af52ab0df3d3ef9073da

      SHA512

      6906aadb1271e74ad7221a0a252440343fa81f7c2bb95497e05619ab85f5fd2e1057ed8d4c8fe133b55d31dddd5d29ddc9406419a2b43fcdd21b25855bf7610e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      58fdb98f520b796cd87dbf3b12f54b9d

      SHA1

      058304fa41883feaa8bea37971d086ac4964b4dc

      SHA256

      da49296c320a66b9cdd7542001647296cd3aba2900b77bd4207a661e3c20abf5

      SHA512

      f75d6965426823ea39bfc82ef9d532215fea113b49e8688808e40f76573de8a35adae5d59fbabf6a7522db96ac8dae8599b50b1d028e6973a6d16868a2fc8853

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3b77b03a0cef3ab41dbc37bea88399f1

      SHA1

      28985527dfc7326e7603ce229098cc7c024b85b3

      SHA256

      989a9ef727f51501e905c5f1d58288f3114f1aa92c0806609810abcaf2c0e15f

      SHA512

      e4d36442e31def1281ba4e19115e8f886988912ef9bea360dfcfb084ddd70a749c9e7e44d6c0b6e17eb1d131e8d83eb72749fe93512646dd81b95068295b40dc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9f7c5c3d51fc7dfa545e5a502a204f0c

      SHA1

      778a578ddad0facf3f5f3e3e4eecb6e274d4bcc9

      SHA256

      0e5b3d7070c718295293d0f33d5c6a9d6dea5dfc2c7eed431dfebb5287212add

      SHA512

      a5e943a2ad99bd0acb6a2336da4399e3093bce71620c5398406af1dbb326e2faed12c5b51b33a570a4d3b219872baacafb43249ed8de3dccd72aa13e1d968c1e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5f04e3ba7d51a563d06d18a9282b89d9

      SHA1

      c3173bb51778d113de67961a06e24e39c9412c80

      SHA256

      9666a6291faeb0bb86e8f647580140a37ac4593496c9b2dd91d1ad0039548ae8

      SHA512

      6f799124c9688b72cf60b64a503d126da80f2a2d8efbb654b8c1d4baeeb59f6ad0ea715f044102b81607e0f2c7102a1c736a8c40029c6f6050c0187eb7d8bf5d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f0e3fd9574b4a91b65fdf0d28f263cd9

      SHA1

      65614634bb83552f1836aff9119c220ea93170fd

      SHA256

      fa8c0566b83cdeb95b787f55b08ea9b25eea979213b53978afa557bfba20126c

      SHA512

      bb7614f56505d635aa2e9e1c830e9c547f249faec815670ca7b8b524eb03120d24c2b1859f2f54f990d7e879b7c29d859f044c87d840913a1f93a2b3e4b8573b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d58605f5c839d489bdcc561547ae6f73

      SHA1

      2521dc297a5e74031496b9b90e8311f52a5557d4

      SHA256

      803cd3db73e140b92e78919995c590deb57a301dde1479ac869322bf6468c951

      SHA512

      7664a4f0803dee8214efc318b7b136b7ccec13cd3acd215c7ff0f379fb5184f097784d57b6ae89df3a1b395e9c5a54f43c217c935a06888aba3d0ea7aef2f8c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7a4c461972d8b5b6943330509b666571

      SHA1

      0e34900951811d57381251416938c7be7bee07a2

      SHA256

      dd7f31da6f98f2a7e641082db9e4a2b896dee8b92604d24645543fcbec09c6b2

      SHA512

      b7f4090af278191adfd01e0d4c680bd7b3646650807bc18703a59f6a4f868abc4b4fe1b8a67b7d38d6e005ddba792e76dc6bb79af0b28989644c66d8a9acda3a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      afece2034d1ddfe15bf6220372952602

      SHA1

      c8823ae414feb8f1435c169b8fabab59db564a91

      SHA256

      c8d97300bf5e93f2a557a29ba0d9d00d44531927c443b1b4f64dfc2db58dbc29

      SHA512

      24ed2b4ba7ab7d064d2395c6071e7f91720d971ac59a0a367cac4dae46b50787960d0ad88a80b33e3f15ea65b3696d5660d3bab4d3547d5bb8fff7e73d2810f2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d3c69cc74c2b61a8c16745101dd8fa05

      SHA1

      48042962269a1723eb9748962c4caef184b06996

      SHA256

      6ab8b11290be987132dfeda43024e0b650d5550225778a4f98aaf8f93fca5829

      SHA512

      320b9794b1ee85dbd9b1f234aaf5d3d65c56a2147f1dbd7fdf83152efa3d90567c5ccaf4746472d2903d38f6ae087901fc435bb695b049f14fb36419322d0897

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0866f471b9e3d7fa8b08103a8c376527

      SHA1

      e609d6b4bdf428f977ff6f2a016831f8816fb40c

      SHA256

      38c1591838d84e7d309cbadf7a1da0baa3f9cebf393c8e8ae01b6aaf80a77ed7

      SHA512

      9cdd291f1e6c5175fb95fe0270e3fee1ab2eee081bbdd5b098a6d243d889a4a2dc736ef8186cdd5752e32de29dca60d0026b1cf8df2e855686252f11d899e67e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8fd85c2b470e6214d4d9af501e3103fc

      SHA1

      f05f23ea46fc0c1f9069d534ac6353ec4bc4cacb

      SHA256

      d53207caa64b528b43404407c477660b22292e3d96725e56026ae16f0bae9158

      SHA512

      01da92e56dfd0e73655521e589b6e8b4dc30946e55936689d9e488836a73d7f73cb9dfd44b7fd048f65e2762f79495adf49b5c59b8bd8ee873f535a32447932e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      81428222a9b06cafdc0fafa3dfa7d00e

      SHA1

      614bd97f701d3f87488da693214b1d2c75bf2280

      SHA256

      8a00b80b9e21412d9c07172ecbd4ed7cd966ee1ee5cef4d856d330b96e259bbc

      SHA512

      a57922942d22cc512d598748dd34c10922f8b5b988839f0606621dc125e65823c5f2fc7ffe7ef472ea8a7a11a17694cd7c654dab247c98b7e762e10a739f3328

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f7551ea431d3b78aa7fd6f8c87fbede2

      SHA1

      d036720d635a9f42e63db0aa4dddc984e1ca8d99

      SHA256

      f06ecc1387ef2a7a674fe0baba53bf797b1355cc91441e27efd904bd2ccf48b2

      SHA512

      72f37c0310367d74dfbb48648bf98219f6b0f869f1ee4ffd10e6b3a8108520bfa8148b43983011ef26e79759fd9b093eda03c78aedfe3e832f3245c53dbaa4b6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c032e52019d36075dcaced5334d06fe4

      SHA1

      8e21b6d50fb06e08752829554a0acccace137f5a

      SHA256

      1842b9d3453d9579d46f58ce127054986127e28dfca6145f53aa1effb4db3a6c

      SHA512

      7f2509263379fc25e450108278aa350ae360acbb5ff8af824a6dc67724f67394b36b0c92bf819518c3b5f278d0dd198a469f5d23e500fca8c0a177c144f44d1a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1ab0633c46b1b26a589a0f0928ac5d06

      SHA1

      b1339153379e04362e62f852104257339dde9c9e

      SHA256

      141bad3dee63c47f9711f6b62c1ee7b3498eaad0eec9b60a1d823c4b85809396

      SHA512

      613cad3534423dde84d85ce9cfd5322e7bf30c73a2e6e66253ad00146c9c2102615610d95c75daa59574a1d821521f03485134d0e98595a32623c12392828622

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6d6e0c5d33f2babad5c04c4debda1fb3

      SHA1

      606909bf07cfb1a6e34120bb3a7b064212c3e610

      SHA256

      c836a9bea358d73bb19ba55b5c5b8a40e1b1b498e342b7f880c6116830f566b5

      SHA512

      fccac501251497a6071cbd5c24e4c4b023da99b32905e5a970cb933f382d4fdec2215e9908eaff3168a18c0b2b045dc5a5f151b67ec3ba363e335a8e1a024842

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d4f01413cf450d2f5946a902868106b3

      SHA1

      91e596c9206a22933fed5837fe7959ef61778762

      SHA256

      f9c52f9598618c7c599fb10e848ae24b9168ce0e1b0d905c87d473423d19fd82

      SHA512

      f68615ca931f45f66c35f6bbe19ca442632843c3efb867c71959a673f84b0be3a2f2828a9c6e3fb7fd1d0472063c95f46a043ab538d0e0fae2ef86ba8e68fd34

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b02ddaf1e04b783a06b4f4ed053552a7

      SHA1

      a8b018a56d5bc778061c7016efae6b1b40c2c392

      SHA256

      5e13db602344554f73ab27e3f09322f71971baaa658ade3054992503fab9951c

      SHA512

      acab08911880a36b38cea1b8957f801f2e0cc6cc8d1d18591af82675096c1897f40e86e3438908c1a2d5d5c29f80ab2088974bfd7258a1cc60f43d5f58d0b9be

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      46978d79d7609c3d998f249dffc827cc

      SHA1

      6084e2a315eae905019fba390900283138854fc4

      SHA256

      8c59a1f9cd49e8f72c0351127993ba0eb032a1c3ff7cb00022ace1076bba7bbd

      SHA512

      7b3c20b98b9c95655fa4ed06522d06a73c0e973116c23b7e7dc9293cf4dc5fa36fbfa91f7f1337b123e7cee704e6cbd813cd4c27e64aaa327bf52988dbc00831

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      03fcf5e47b7d25b71f6f59b25023b12b

      SHA1

      a0348b338bcff3b5979cfedd1a6c919381219ae5

      SHA256

      77d6a55857bb570ef3a8cabeb3a0457a22d4ceec52ba36e9dc0a767c806044f6

      SHA512

      dab8ae85a680392db83bb821be6039f71d1bdf6222cbf3cf08959e1520e3e455661d9bc58d76c7d1836cdd8e475f777fe18ea8031674b92100236f4002d1ebfb

    • C:\Users\Admin\AppData\Local\Temp\Cab5FDC.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar607D.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1360-440-0x0000000000240000-0x000000000026E000-memory.dmp
      Filesize

      184KB

    • memory/1360-435-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1360-436-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/2352-448-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2352-444-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2352-446-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2352-447-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2352-449-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB