Analysis

  • max time kernel
    137s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 09:30

General

  • Target

    a4db47e1a76758fb66286ce761fb09ad_JaffaCakes118.html

  • Size

    127KB

  • MD5

    a4db47e1a76758fb66286ce761fb09ad

  • SHA1

    736898299cac4b3ffaf0b70ac76fd3c4d051e01e

  • SHA256

    718ed10abdcdda920a002d7513c64d0fb558a2f6f3e1f7a7bfe726efbc2cc9e3

  • SHA512

    2e175ead02b758f30ba92d09a63a39b84af873d4aa9f189c0d5a8556600012a3a4afd73f3cb73b200f9f76389cf6301954c9e729abecc808c8d7fa2d0ea9b30b

  • SSDEEP

    1536:IHchmcXclyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:IHch5XclyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4db47e1a76758fb66286ce761fb09ad_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2588
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275466 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2424

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      eb53d8df78fc57db378540d279598116

      SHA1

      fbc35904465df2eb5838bfac44e0c8f8f7869b2a

      SHA256

      bd0c680951b530037a83172e05885b107fe82d841dc28babac679ab657b8750a

      SHA512

      87f94732e60befad0c69610342ae35069bc8a920e4b9a06f9717359d2985b5fb8f840fb32060097e6d6587e71cb9bca2aec6666cb17d10e6b8205b5bf9570724

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b57c87adc3524bbdf75826e2b6532a0e

      SHA1

      b8d70a70879e41983996166bb2bbb26ad2ba0797

      SHA256

      ed25e4584e752da17bfe8da4da280c5c3006fd2a060a41cf89103097ac8fba5d

      SHA512

      bb283d21fc5deff29225fddb1bda40b8bca2210e1e4462a12c23a57792165be1e6d0da188887b7498fe340b70e009a60ffc1417d8a64ab262b6f9a374ed3b9c6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c37022f36f1994c69c3582ad3e36510e

      SHA1

      edc427524c66fdab27a4f27a9ab2875dadd06335

      SHA256

      d93033d31eccbc1501fab89db8155b226f1e1323bdac10a3be33c576ec6bf6cb

      SHA512

      c2d21d887c5d8869209aced5cfec8097ce15b1776ba12fc7cf8569e2710e6323dacce81c5f46016569b01a0decd41389ee2d80f16e6349ab54d440aa6a7a7a5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      67013ba2a38e714982482c11a86bdd73

      SHA1

      23d739fe7da980d7f7ea01400d3db58314af3101

      SHA256

      f408d25cfffa5e7603e657f97aad6580ee7468d53e0a9d45593eae92a3f10720

      SHA512

      6d2eff7cc5d3eaf43d5f1eacee626aa3096b336bae839ace94576486b3e07c682de54aa7736fa6045c3ca1b7bf2b98be881908868a813e4ee9bc5c0b0e561857

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0a800e77faac933d9889f1018cff2a05

      SHA1

      478d917a2c3017e67d6598ab95f6493d0cb11f54

      SHA256

      270de1d2073d5e6df876466f5204a2727260cfbddf8200346644b2020371589b

      SHA512

      d098c6a6e9e0be70cee06ed1a0cfffb9b47376d91ebd0d470609c51085da32d20212513b3653abe65a3c457264a2f5603218b34df96e94ea7abc71dd89f53f32

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      14742cf4ed329781879e3828640d39ba

      SHA1

      15bcf61e6120c7239d61cb2e9b6e25e02e3d419a

      SHA256

      f393329255d5808bc2a7d437c652e2dc9a5d51504d220a74a35967b40e3de96c

      SHA512

      31cc9cdbb44effd21acd800a471bc6babd23407103e385e57f9ba72b253c8558cc14151b8ca69fd8279b52763c2815ed44fcd516f6fd99cbf4bed83eebb6d6b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      77349f2796c1a106633a9d8b4e809811

      SHA1

      a93f0a2d72ac1547bfee430d1598bdb09efdf865

      SHA256

      180426eb619884ddec62a2f158734e1283c5252f92283cd213c25ec9f1cc8bf2

      SHA512

      413574613238381c97217593cccf77a53af988ef4132fadafa28cc89ff7f46bc7fa449a106237e3cdc8412199f4f5e50c0a18551f6f56e75a0db909e434bf271

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8c53121767de432dcd1ceb56a40ce994

      SHA1

      7e948e165309a95bd4436ef19244dd0ae6ade428

      SHA256

      fd38d035d2973be44766774c1274b5b751cda265404e5f8bfe5846c2df842729

      SHA512

      996d310bc5e7108d42eb1d889379a4cc56d88c40b5e36565440721705e199ae5eb809d7f57c8c510027fc4b7394198a728a3740d33d77a5b3013fc83b52abf89

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3a60d05370390fb32bdf709078b19442

      SHA1

      778fe0adc4c0bfc50b31ed40d4d4c1524c21d0e2

      SHA256

      d8a016501244e541986fc31c3c8c01403cf34567d7a6dba76a82619823a98141

      SHA512

      fde541351f6b5aadc965076f0d2e555018c3aac25c9a669ee2e2121d244b48928a5613c5e93f7c84e8de63865e1260209cf9e8f6b5d31fa7d3565fb062b5256f

    • C:\Users\Admin\AppData\Local\Temp\Cab2139.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar2249.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2260-15-0x00000000001D0000-0x00000000001FE000-memory.dmp
      Filesize

      184KB

    • memory/2260-7-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2260-8-0x00000000001C0000-0x00000000001CF000-memory.dmp
      Filesize

      60KB

    • memory/2752-21-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2752-19-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2752-18-0x0000000000250000-0x0000000000251000-memory.dmp
      Filesize

      4KB

    • memory/2752-16-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB