Analysis

  • max time kernel
    136s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 09:50

General

  • Target

    a4efee5ac94ba6a950d2d41c722d3ed5_JaffaCakes118.html

  • Size

    155KB

  • MD5

    a4efee5ac94ba6a950d2d41c722d3ed5

  • SHA1

    ec8d6e4610214d4d3d5673d48af73b0b5c01df64

  • SHA256

    dec187a85dfe02e14d8b159238a95d274aa496023e3d4d61cf2eac9c027631e2

  • SHA512

    690bf421a08df08c61e678ca25ba8c327c4f02f6116aad873c729bc3996231c51b0679f929f58c72322bd45388c983693584ab6709f3b783e29b7be9f7edd41d

  • SSDEEP

    1536:i5RT+zKXblHKztewRuTIJSivwbdyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EXe:ifnHMDEdyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4efee5ac94ba6a950d2d41c722d3ed5_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:408
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2496
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:672
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:1848335 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1524

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      be3c7fd2b7ee3f70b4c023ed9c967a25

      SHA1

      3980d03cb04cc72db90f657452839cb000f8d998

      SHA256

      51cf20e1e86947ac27f17008711f42a6904e2513aed534be64ccb9a9715bff49

      SHA512

      c6dde8ad81f66861f86e48d2fe19b00af4233f04a9ab399997b4c0e4e114b1007b5dde464f70e333f0d86d03cdd4192508a65053c447749f737e25ec4e48b7a8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      288b10c19dfb54177d1fd7fea14fa179

      SHA1

      bdadf6a96a39306d076240f0f29db2d07a184acd

      SHA256

      7d63bb95986ea6d1350a6c4d125f44be8385d3bb83446cbf042e876ab5144c04

      SHA512

      55fb48a645def6d577e265be649be06f5cd4c6c823f4a239105659d30c273e398d01b02176c57603c01df2c57b7a0ae336d9b2df17c5b22d8625abe02f785055

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d5f7b642a537309a4cc4fabebfcbd3b5

      SHA1

      34e35bcf8784d2f64a0c815bea17d64627ed936d

      SHA256

      09569604ddf638abc9c2a991bed946f6981cc3b560bff3bda8c7b2aabe1ce656

      SHA512

      0e762a35363f3b3b0798265c64575b2c5da6dd8b8c6fbd9749ba726ce0ef8b3164163d940809ce8d1942d70bd6ba971f31b311f79fb75224b24ecd15e1b351e6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      4959f28d88fbd04ed836b6ec58f36a3e

      SHA1

      1f80584d6b4789608249484593dc43de61c3701f

      SHA256

      b0bb41f4754e3b24f1653def26d578a6b2d92fc281a26e10fd2fcf2df7a7b663

      SHA512

      2ee5b79b78340722b1eb9b082dbc68a9b56c115d854975d9bc7949c8694dded466072e9c941564164a207fca041eaedcbea8e800a3e49ac520dd318466a43cdc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1ce39776cceb36921a23ea83bd228945

      SHA1

      82c4197dbde410f3896f5123e7af1c244700dd97

      SHA256

      ea14ab4eb2fc39e9cbcea7bf50cf106e86244aa32ca2fdc900b6a096988e5ec7

      SHA512

      d8e55391d5d831d02ab8b4ecb877ceae4edf5dee6a56699118bc9e1a4af16a5a21e2e0fbb1cf9a30daee02ee990c02785791b81c36cf3404e4704e68550f9a08

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      44207c03503a1365d0fa2e59e317eeac

      SHA1

      631cfc8a87e0e56ed6935046c67f3e9f2c8fb84c

      SHA256

      8d4c415bdc7c31a4a7519b4db09f686e4d05f9af5f243cd556b9e49822baedb9

      SHA512

      157f558c402658048b8ef3502fd06b760b226ce8f60a512afa2462e610de657d791d02148de864620a34f77300be4f88d46fb3d4b378c6b943a725bca24ad743

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c697a374f2e45003152cc57a4a8f178b

      SHA1

      e50d13996c9ee6b34e3b645faff257919ef27ce6

      SHA256

      97c68e26d26c83e8ca91ae3a3e73547821ebced72d57aa66da5ca162d3de71fc

      SHA512

      e1eb9707f9f26f8eb092814115dffbad54400fd6d3185f07217dfee8a40cd05645888616a79d2e596cdba6c5dcedf2aa33944a489bad0486a126d4db7286416a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ef3fcd312eb0ef42e677ac0221c293f6

      SHA1

      b21d366c68b577d1f3043a3a1265e27de4cde5f4

      SHA256

      65e7ff36caf68f81f8ef86674a581adb1a50caee3d8ededa487c5cabd964a9d3

      SHA512

      c9e503ee0dbf65eaeeb39374d941cf61957eef55f7b83e94023cb1b77dc1f383dca63962ed71df31f0d32e0df2c8598c1175929a8d0b93329bd73d02e5fe9f17

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b34bc947b93f2676b9ab5bd6423f00f9

      SHA1

      b13ee6b04f5218f8ffd9a15d7ec1958c449497da

      SHA256

      13aa8c9f811140ebb207c31e8666070b41f7fbbc8d24522917f62df96badbd3a

      SHA512

      be990e7bf7e1fd7d706f00847bcda69b8c3bd56197bb569d65255484cbff1a1f610110516c8d10f3523dbcd93023d4ee657bc4d6bd0c34d98da3bd7308c4cc8f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6944311c9911fe47fe3ee1a722345b8a

      SHA1

      a2b890bce9bd72448702a68b5712bb7a6621abaf

      SHA256

      a6a4e118ccde9210300f946c2caed35254208115ff9f0af2cfcb9eb26d14925a

      SHA512

      16ec23f5b1f3361aa2e73b455c2468aec262c0d2f864062f7a4577314df0990a3f403ad8c9e651464f0ce5cf153ce08a8cc829ccfa5b24f5ed9042d0fd4f2175

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5462e6def23fb53454a6b818a49d22ee

      SHA1

      f3e7567bc9de585732e6d77305029a7bef02a9ca

      SHA256

      328ffdc08dc127152e3212c3409d3fc4ec392f8f5e085ece91cc51a34106d48a

      SHA512

      d5081d73bbc06e2d53c1028f12c5cf79c473c9a7979b0a1a686ebaf11b56f2da0aa46d62bb010fbee1d4a8dfe08001bf22e1343c8b198a9e5d188168825ec28e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      227b91c4e0839d1eb8ce6b96b811b648

      SHA1

      4033d0196ea113d9e4871adc06c05fd782081a9a

      SHA256

      8b2b4490c0917158dae8a9a2a70d100960d4c132ee56d4044cba8f8a2093dee6

      SHA512

      5752724f29cda6719b95503c1d6cdd3de246079df2468832073a3d1ba1dfb999a51934ee62c4c4fbb63bf9462a26d68052bfb1b4c80534267d9f727b7f2c74a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1fca71d04d8e4401f899371049e22c0b

      SHA1

      ebc71f6374992102c153e9739e1c85f8e8ff1b52

      SHA256

      a9cbc3334ae95f0b9fc30f146dcc0d1cbc6361112b2f448f993683d80e18c2bf

      SHA512

      b9c204f8dd898009621f310204e871bdace231fead07dab9b3108c54d2f8a2f52dfe1353beda90d52ab5f688839c39a8783facb33b04c142768e46461d69a43d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0075d765649c4616ea0f190bf1f00ee0

      SHA1

      4333baba7829e8f9a1dd2d34b7c3b98b0514197f

      SHA256

      cfdab623ad8dbed793d6850adeb85dba7830ac2b07d1310704e99159ad19278e

      SHA512

      3a8bb1b6755f07e99c7c2f8d4a7d9957c6648e1b89866089f04f1ebc31ec7473e4379dd107ae1d9f7ba8ab5e96dc826965e0a324af15965e660eda46d4fe4aa1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      151b536011184dc054329a9a2924b6d7

      SHA1

      69ecfc123acc676032b1c354badd4bf669b7f7ff

      SHA256

      f197907d73080a66744c6f11515a27fd7546f2b041f1ae43ba2860bf2aa7f2b5

      SHA512

      a2fbbf458cfb2603438cd0c5a19fa0d6c80723743ffb12b6ea48702de8bae9a13a4e0aaa9a09f7cfaf3edc7591325c9b561106bd0189ed5e1980003cc4d4c20e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8610a31e1c36c28f135f03ed0bc60fde

      SHA1

      6795b5df94aad2536a880cda8e34d0e0bee19fa7

      SHA256

      a96a76c17f11b1135d8e062378464914d4e71da3c3e31ba2a32a5bfb7321b3af

      SHA512

      56afb79ea8b192a83f90d464e196db588ab198cdd8d6fefca21258efd547aedd96b60ea916440104c54b72caa0bdc3a2aa6b62d7e7f0213cd693cd9e5f411142

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e6a0bc18178bab17610f382c64efad53

      SHA1

      b7891ab1b05d0357402a024427805fd52bcd7d83

      SHA256

      3711747f0c24977a2115e5002388893809b651896ed9c3b16eaa894641253f11

      SHA512

      9ef1baaf68dfff1c8c921db9462c327b8bdcb934a326c0d1a9afda438387d9d40bd55de458347197b14264c0f3f8e197401a3aeafaeba6fac5465946b122676d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0e0b16f6c0f818a3729cc0c5f0567daf

      SHA1

      d39c3acafdea22856be0da5df2fe06fd937c095d

      SHA256

      f108cf70ae4e2f494cd12788ca770a1123c6c67fa3845ee98e530caaca6524b5

      SHA512

      31a894a7975e5db8f5896a9283abed0d8ad1bada24918ab1f83609081f30ec0e77300ced64511bb0cc7d473870d61528673cf337545c1f441df293a812079356

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9126d7cf83fdc56f885a59968ab34d0a

      SHA1

      9da418b608e0aa6e6694401ff78b349d84fcc5b4

      SHA256

      562ff430e17bfa231e800332267821a610fa95c1059aabd7569cf3fe867233fe

      SHA512

      8cf920b20c74538d1dc6649278004d9b4ba0208afa0ab0f91063fe9596ef5259f7cb9215533d6e4c1f90c8077836d7db714157545c475a9c449ec129ce9481c2

    • C:\Users\Admin\AppData\Local\Temp\Cab198A.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar1A2A.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/408-436-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/408-437-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/408-434-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2496-446-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2496-445-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB