Analysis

  • max time kernel
    120s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 09:28

General

  • Target

    a4d9123e90314a1aa4677436bef31bb8_JaffaCakes118.html

  • Size

    189KB

  • MD5

    a4d9123e90314a1aa4677436bef31bb8

  • SHA1

    b2a0a4542b509a1d36d7b570dfebdea2caf3f98d

  • SHA256

    5610b6d2226845705b1d1f85b86f0493a4850ac31cee9be34c55ee41154d8316

  • SHA512

    b08f6e83eb217ce6accf2c5c1ecc56626d98561c113931fb5eeec5641d55c038bd1caa2aa960951f1f6ee0b5a4f609cc9505eb5f87b2932b290a3976c4ab7239

  • SSDEEP

    3072:+yfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:bsMYod+X3oI+YS1tA8

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:384
      • C:\Windows\system32\services.exe
        C:\Windows\system32\services.exe
        2⤵
          PID:476
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch
            3⤵
              PID:604
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                4⤵
                  PID:1820
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k RPCSS
                3⤵
                  PID:684
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                  3⤵
                    PID:760
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                    3⤵
                      PID:820
                      • C:\Windows\system32\Dwm.exe
                        "C:\Windows\system32\Dwm.exe"
                        4⤵
                          PID:1176
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs
                        3⤵
                          PID:856
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService
                          3⤵
                            PID:968
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k NetworkService
                            3⤵
                              PID:240
                            • C:\Windows\System32\spoolsv.exe
                              C:\Windows\System32\spoolsv.exe
                              3⤵
                                PID:296
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                3⤵
                                  PID:1044
                                • C:\Windows\system32\taskhost.exe
                                  "taskhost.exe"
                                  3⤵
                                    PID:1120
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                    3⤵
                                      PID:2136
                                    • C:\Windows\system32\sppsvc.exe
                                      C:\Windows\system32\sppsvc.exe
                                      3⤵
                                        PID:2244
                                    • C:\Windows\system32\lsass.exe
                                      C:\Windows\system32\lsass.exe
                                      2⤵
                                        PID:492
                                      • C:\Windows\system32\lsm.exe
                                        C:\Windows\system32\lsm.exe
                                        2⤵
                                          PID:500
                                      • C:\Windows\system32\csrss.exe
                                        %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                        1⤵
                                          PID:392
                                        • C:\Windows\system32\winlogon.exe
                                          winlogon.exe
                                          1⤵
                                            PID:432
                                          • C:\Windows\Explorer.EXE
                                            C:\Windows\Explorer.EXE
                                            1⤵
                                              PID:1232
                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4d9123e90314a1aa4677436bef31bb8_JaffaCakes118.html
                                                2⤵
                                                • Modifies Internet Explorer settings
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:1928
                                                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:2
                                                  3⤵
                                                  • Loads dropped DLL
                                                  • Modifies Internet Explorer settings
                                                  • Suspicious use of SetWindowsHookEx
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2732
                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Drops file in Program Files directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious behavior: MapViewOfSection
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2656

                                            Network

                                            MITRE ATT&CK Matrix ATT&CK v13

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              70KB

                                              MD5

                                              49aebf8cbd62d92ac215b2923fb1b9f5

                                              SHA1

                                              1723be06719828dda65ad804298d0431f6aff976

                                              SHA256

                                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                              SHA512

                                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              0faa40f67f5990ddeac9e07341872a99

                                              SHA1

                                              05fcf7348980fa95ff293a9bcad4362253873d63

                                              SHA256

                                              ccc7aeab9ecc5f26d2c4c1f50cc6c81dbcb3eaafd9127165c7d25dc144527966

                                              SHA512

                                              cd3540730903c52c247239570c60b965705168ceb989cda7dd8f0bfa05e39f6bba701c153a612588127e7d722654153467ccc7177e4066acd7b0931de826dcab

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              73de363b9137e3a4e352b9050c4b8a94

                                              SHA1

                                              a42083c0489cf5faa4853ba6ad44ca28837ef7ff

                                              SHA256

                                              99bc6e2c26d66c2216a278327203adbc2dbb357e5398df939bfcdef70ca2d07c

                                              SHA512

                                              e868b8950d2d909dae10cf906a43623f230a3f4d3b2b6f530ab3e64bf47b810ee199d8eb22c1c8c5b0b0288651b2e204826d27e3ff8b0c09d8298ebaf9a7db3d

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              1c2ae43527a05fa6d3a1ac78c127d6c5

                                              SHA1

                                              6aeba794da8365972090984cd916ca7354050304

                                              SHA256

                                              bd6bb705a70202d12a049c310f50f037e4f8fe28b3cff47b638655f986868d3b

                                              SHA512

                                              9edff90c4147389f6c2cc0093a6d415e62ede875e699d89bef9eb9bf03c58a651cdb86881cd5b3c0a590904af263e31d510eb6e5cd80a2c5a1055f83387146d5

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              db0cf0ef03eb69cbde8470a4db57a394

                                              SHA1

                                              ad3a30d68b89eaa791cddfbb3bf645bd08dfe6b2

                                              SHA256

                                              fe783046d515ef1b9e8e446dc8d95680f455f0561ab263bc9fdfe655bdcbc799

                                              SHA512

                                              2033a7b664b0828afb477c64fdd8013cc79649e9e74f15a29da17fb47a6608d19070f50f8208c9b75d6de7777b848344eec5a684acc8efa70265bdd71ec460fd

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              30b6b224b6363aace928df2e0d3523c1

                                              SHA1

                                              524868e972e95d8a0ddb85319478d91688b278e4

                                              SHA256

                                              6c192cab78a2374651a5cc1112c3180b8fe500b96cd0d9dc0989fff628d0626c

                                              SHA512

                                              5437c7d45dceb1ee67beb2756155438bee04574f149465158422ca89e4f5956f2f54c069819be402689401d363ebf071c8b4a588cf3941312aa078421f37b058

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              bb0294445cf90fd2c743f63aee5e4153

                                              SHA1

                                              ea4418716dac856c5fa1dcced3c53004259f9a5a

                                              SHA256

                                              e95cd771c3e4b3067f2e301b3e355ce017788a1c00b903888ea8c5979b393001

                                              SHA512

                                              683f5b39844a66b976b018a55dbf97bd54b41f2e26553d6a934f4af8e488f950fd3a0be0e8cb9377b4d316352b757d1fe3d5e9d4d2171845327cd1a0e51bd19c

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              819b6cb896cd6eddd3249508d1396174

                                              SHA1

                                              c51dea553bcd0cc8024d7111af569101873de040

                                              SHA256

                                              2bf05f22e52fff2105e6907a9b4b5a9b1fa5e8925eceb49524bf36bfca6f7cfc

                                              SHA512

                                              eb986e8ab5caeb1075f892f688d2711e4a0020c3f74178f81eeb68592443cbe80c9fbf525ecc64f5ce271124bfc3fa9b2d08056cc59c273392c273cfa5ce6507

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              9591d78d24722b9084a1d9f02616f021

                                              SHA1

                                              08cfaad8c313ce99cbfc96be346f63a98a7b3899

                                              SHA256

                                              d46583143cfaa662a96d9b7a9692bfa1d81a1252f7db8528444ba8a97cfaff62

                                              SHA512

                                              aa7b5bc178626f263c8e5b52f6b58ebe459876e4d41d2cbe2a850deca9647928390e2656f26d2dd78c1dda77d47556affc25e51e4cf6ca6163d9a54d55f95736

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              5c76e54421c6e549dda9aa73f6f42ca4

                                              SHA1

                                              9b50a269eba647c52945442077f271f6fe4e8cfb

                                              SHA256

                                              fd670e17548340af60aae9532c2fce38cfea4e196d45ec17b5f33a8cdf37d70f

                                              SHA512

                                              a88dc075c2267fa645cbf82ada9589ede7107c7dbdb44f4f7e0d6936d618c9bc668e445335d0ac769ba81cc995b9a6a34255447fa72d65eee4b01d16efa4d7c7

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              68100842b20a7797293305eaf618a3a4

                                              SHA1

                                              6825408d56e9faa1bbe76ef5dc97a372d7a4a81c

                                              SHA256

                                              42de9dce5d8d9e1971d5c20d92b9fe5dc9568ab402f7ef18b5d20e2a47ecbf1d

                                              SHA512

                                              49a84038a9d1004439a40dde625bc430eaa3afc5907ad90fbb7770e95180cdd656f7442386dce7c9966e99361c9ad9d77c0435d5f634022dee415a28bb2c4525

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              be51d1d2d7d0b41c00e88c45d10bd467

                                              SHA1

                                              4973d7ffbc2b75f5c24fb03efda02d4023164e6c

                                              SHA256

                                              e99f66ff146feb4be9df708b865924dadd53770a1c96e06d4514a57bc6a256e4

                                              SHA512

                                              2692adaabdb3193b2a585ef5abb397be2a5f59944d41711f4dd145bcb0ae4d9be3dc3df4fed1b6568a74b9cf354117c5424d6ba8e1afd5d5ec0d27ac67c18f15

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              bf789ed1b1c000aeccdc0868808cf87c

                                              SHA1

                                              10b22dd7f2bfe19fb8fd386bc101b9f322b92b7c

                                              SHA256

                                              ac16db58cca578017fcc40257cd405a10cd8a4e8a1059e24185b144fa44e76b3

                                              SHA512

                                              d9d71420ec859087579cb587810c867e0fb242cfb7aa50382dbc3d6c8e6052b791fd5c7e331b100c804497f9a9bb08d7b56f748587828e52d2726e30d203ce73

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              716845cb55d6235a75649e6729432090

                                              SHA1

                                              ba15ee3334c78ca0339180a475a70f24541a788b

                                              SHA256

                                              f1aef2c7ace27d88598513465652312171eb0f1676ba13557c34239ba0ab0499

                                              SHA512

                                              5b56f65f99e4582cd82ca93b2ad006c2d0cee15826ca2be93c053fe4bb8f989a703ab6eb34e4ac24cc8331b397bfeca9cc338354a5e535309e8b3c18004f636c

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              1732dad86fc453cbe0ee785758b262ca

                                              SHA1

                                              38222991ca4df0f13fb88348ec50494719e217a4

                                              SHA256

                                              612893b1820389ca26afe8bc3584601d808f8964cdd8d428d69b78661707912e

                                              SHA512

                                              d864f32c48fbf2120d913311a827e8ae803b184e2cb7457abf51711000a190c52ac5fdc02ceb505ecdf62d8ba3d69ff99e7a7b2d4c895865a511a90fdf137a48

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              0ff96c6e7a18bcccfbfa0b73316a4e62

                                              SHA1

                                              ad40d7370a95337e5f7c751e2b861d886f94bada

                                              SHA256

                                              cece44aecbb9dbed48fa039e24097c3beebf32fe2039c803d669517a3cfdbb80

                                              SHA512

                                              a37e26342919b6be626bb24567d94cf6d607db23344ab065817f496bb8ac2bdd81570d2ad01339cc5fbf1d291c5f2cf651f837c66edd1907cbf52fdd595422b8

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              9c5230d7edba77126648ac372476d592

                                              SHA1

                                              ca47b1467b1451d1aeb4feca1689f9a33d5baf7b

                                              SHA256

                                              7587a2fea5194eb7e58b4dd785fdd198e508e539882d6862326f5e53a273965e

                                              SHA512

                                              b82e423e94a448b40354426191f2996fa3b1f91d15d9d730422e9e88c41ca9472b74a45b9b50c29a16c6a857e4e92be943c0a190403d1a9be3ce6b7c7cca6f3e

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              4020250a8520734fdb0e28cb81ba7ce1

                                              SHA1

                                              1543dd6b8f11732f5c4ad2333446c62dd988431e

                                              SHA256

                                              8d1774f67446c77a1a1dcf64373acc809bafc0ac99eb9745c7e7cf6b133c4bce

                                              SHA512

                                              0b018ec220e1ad2d1af4066d68bf8ae02f373a1c0c40a9cc3a14bc6201f358ae1ba33031fd0e2039b24581b016e52eb4ddd2757c9d4e12c27afed545cfd793d1

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                              Filesize

                                              342B

                                              MD5

                                              58a813f89777ce33a4b7ad4ac20dcb94

                                              SHA1

                                              02b537113e684144bc40e6ef5bb6c0b6a57648bc

                                              SHA256

                                              969baa2bfc5c34aa55bf83c9ab3c256a53581affa02049f7c55371aaeb0d8836

                                              SHA512

                                              6f679cd3b2643afeb3fb090f3ac580f0ee2d77c1bac55a5b2156e60dc636e70d20673bba4ac32fbd88d199643f7b0c2aa9e4b3a5add0f943760df9d800bc35b8

                                            • C:\Users\Admin\AppData\Local\Temp\Cab457C.tmp
                                              Filesize

                                              65KB

                                              MD5

                                              ac05d27423a85adc1622c714f2cb6184

                                              SHA1

                                              b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                              SHA256

                                              c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                              SHA512

                                              6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                            • C:\Users\Admin\AppData\Local\Temp\Tar467C.tmp
                                              Filesize

                                              181KB

                                              MD5

                                              4ea6026cf93ec6338144661bf1202cd1

                                              SHA1

                                              a1dec9044f750ad887935a01430bf49322fbdcb7

                                              SHA256

                                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                              SHA512

                                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                              Filesize

                                              84KB

                                              MD5

                                              df455f0fa8fb3fa4e6699ad57ef54db6

                                              SHA1

                                              51a06248c251d614d3a81ac9d842ba807204d17c

                                              SHA256

                                              15068b86edc0473a4f96f109830318e0540af348197e2b65f2e90ff32cfb14a1

                                              SHA512

                                              f69dea5b68e4fc8737fc0e6ef48476d3ed0a5ebd2f9dccc9d966df137f9ffdbb51e413a0852c22399afab53ea8a2755664afdcee6897a1cf387a9a620481b2a6

                                            • memory/2656-12-0x0000000000400000-0x0000000000436000-memory.dmp
                                              Filesize

                                              216KB

                                            • memory/2656-9-0x000000007778F000-0x0000000077790000-memory.dmp
                                              Filesize

                                              4KB

                                            • memory/2656-488-0x0000000000280000-0x000000000028F000-memory.dmp
                                              Filesize

                                              60KB

                                            • memory/2656-10-0x0000000077790000-0x0000000077791000-memory.dmp
                                              Filesize

                                              4KB

                                            • memory/2656-13-0x0000000000280000-0x000000000028F000-memory.dmp
                                              Filesize

                                              60KB

                                            • memory/2656-6-0x0000000000400000-0x0000000000436000-memory.dmp
                                              Filesize

                                              216KB