Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 09:55

General

  • Target

    a4f3927d465e36c1ada912df58837cb3_JaffaCakes118.html

  • Size

    157KB

  • MD5

    a4f3927d465e36c1ada912df58837cb3

  • SHA1

    e004f4a5fd7cc78d8a2f2d1abc69b91fc2c9cc00

  • SHA256

    ae2a075a143ef235afd079c03034b75c4bdd21b9bb6491e55425a80d78514a61

  • SHA512

    4e502dc9dd696cfc6f49511d7a7119c108d8753f13c68a733537a439a7db0b68e3463f9b43048dd3761420cee6c909f9b2dfe01768bbe42cb01dabe80f91caad

  • SSDEEP

    1536:i0RTtrqR+dhD7wcyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:imb3XyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4f3927d465e36c1ada912df58837cb3_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2284
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2264
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:209939 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2644

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      df20c7fbeadb4c9d8748e3a86c9301dc

      SHA1

      5fae7d7aafced37c12abddbcc0782d8ac4d79fa8

      SHA256

      ad5e10bf22c394494d084f3a0ca9314a7a3697e88083eb0aa9b5fbce5c172d7c

      SHA512

      ba624c1bcb034e4a2d0e978eb1c81bb994d217412fa167fa25445ce1e68c5020a67bf13d89d8d00be08ed03fb2338f30f0231d06f605107481d84ed36fd25ff2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d5d5c29c16857fcba5bfc481cf8fab4c

      SHA1

      6be9ef423cec059e45bec7c4c5a398e80a7ad3c1

      SHA256

      1777e27ad988a8ff5d3f045113522f5fb352978c88a9d69679023739f724167f

      SHA512

      d32f1b177a5312d9ce5f0b9a6273c0b4c6d14582498f62bc7a8ae554d80ed1880206f94ba95fb4a550211ed82dd9b2da5c18c5f2c149c10efbca8241f609f463

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a8f6ec8857353b06dd52b109f6dabfda

      SHA1

      61f0afa9119349ad045c8e6eef59dcb0040c9c4d

      SHA256

      e3570d8674bd587900d6e5dcc8e76ad68e7d0fe086b36b7369878b12bc940a2f

      SHA512

      f343069af16fe662b2775f345679b85a3801b038f1f1a705448e94a36148ca8537667842d598f22f7f2b8e1e8b90a0cefdf8f12382c4494edf5fab522cb9b61e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d9c08948d115532484260a39885c147e

      SHA1

      fbb4f536e524ed69485f9764e0de2132dc895421

      SHA256

      16c62fc40565f28f82c772a4246146158636497e248f86a7b302932e4b1a073d

      SHA512

      c0a28716f60e92a9e42ff8d06ca69cdb81947d80619b1fe1225c71763481bcb9959b76dee7c4a099056dc6fe50a991aeb274c5c4542e9d3fc18c9f4b3038c5b2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c13936f610343cfd68e5a4f722908b2b

      SHA1

      13d968e0954d5e8b780928778f8127ff38795e84

      SHA256

      d989b6e59123acfb8931436e0b5ce51339737c2745ca732691c53ebf84c41e23

      SHA512

      dc827e046796a0d90cf8f4fb5a13723f3cd5532fe6d2fe67b86eec63851d9aa130e307ac7d3fb9ee4dfe84f3c3f25691553afbc9624cb771736a2594e50cff4c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      bd29cd7b3be456702e6ebfc02f50775b

      SHA1

      d471cf19e8684e02e678f127899b37b8e0c730fb

      SHA256

      91b20434ac1614dd4f8b895e6c58065e747e21ea02ce777dc6abf998171aa2bd

      SHA512

      1d44c0d867900cb1110148853baef15bae41559e705c0a80a37afb045571a96adf1f26a727e8e2740b45e2d95cab2c0fb789d8d9bdf24780fda80d1c17e1cc06

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      29936c11d062d1c7234e72c71401faa2

      SHA1

      b64d88b4e9ebefdb883c62668651308e5594143a

      SHA256

      114a1529e012c0a70bb1b419abf831516737f0cc4c8bd87082da9e98801522a5

      SHA512

      9430fd0113814bde308320abef12564b83b95de9006f591c12f2d0583bb771239bd980ff05d352e703976cd654ace784b5ec3019654b11f32545219d6bab1946

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8d7815fc98da685dbc48eebc2427fd13

      SHA1

      73563c01b861b8951b0265c557d626485d1ef722

      SHA256

      fbacbaa8407b4d08e3a133fd8f730b00afb0b84b7111a6447a1d19798f911333

      SHA512

      1f37c30a44324a4b01efd830d3161068f0e12a9ef96e85f24e0f07c21a1cabc7c4dc3c84035bea6fb07f6de894ada1ff7cff4a0edc922409310bda433481f8d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      454a8083f5dfb3dfeac54e4083a2696d

      SHA1

      d45c4bfb000ce1ff8435f1a630a519aee2927968

      SHA256

      f0dd54501a1b9d3913ec6f460ec7b74f7015b008975aec977db4f6f73f638114

      SHA512

      f362f98f5a274ed811161632c24114c3a75a9c85afd84432dcb9cca625606c376e38997fc827991c388fba97c47252011bdde69ba4aead3417d163c791c16d80

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      db9b34c07522546c39dd71cd453d4e45

      SHA1

      294ade608807cd2d743a73e6373f557d8056d39e

      SHA256

      120326faafaacec7ef07d681a67fd3a62c27a0719316e5b3e6c3d5381ed336b9

      SHA512

      644de33cbeb0bd48c24330350dc8c39a47bc108dd0e45a891116c9892e0d432af49dbca16ebdaba82a3a2d703b194563fc58ca98b52d26ff2a7da7d8c0040614

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5b37b4d3129ef6179bd0ccc9e94eebf1

      SHA1

      8f58c1892792a046ed57fdf7d08f71d288872196

      SHA256

      18a85967eb09ed55dc3f393b5b6f36acaf2a3762de6fb018d45f0209da8ec272

      SHA512

      f5ea6b0d9bef3a0534647b1272ad4a8de8ff443396105646fd89b23cc13ab33041d8733f676a02a9b2f02bfa93eb00e05eebe51de49a6ca2d401c0a8cd0fb751

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6f183b211d2972fd656ebef4b8df379c

      SHA1

      7f60ba0e396f277bed02c4e0b9d343d18d207f66

      SHA256

      e56db7f8feadcdcf9e55b6bf2c03a670eb01c7165a4a800d3b5f381488bc0fb4

      SHA512

      6018e90f92b2a77b5bf780f7cc863f902cedb1456f29d926434f4332aa8b24b62a697ea6bd0d9bb8523cd567a0af1ad2df3a2f5e24f500659d323e995c084bd2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      bbf0a3a437e9754459e70c934386311c

      SHA1

      812d32afcc35c60d1d5e7d70ef20bf0ff1d6c4f3

      SHA256

      846911fbc68dcac1e72914e156a80e19739356c8ab6a436a3fd6b169f874ed7f

      SHA512

      9b0966528c2082ec86b079bb1d99c505c10151f39961f555b8390d5c1dfdcc7994afae402061be3a32ae52a8288afd315b7e129901c6a5b4cbacc21dc3c6665e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      cbdd0cc3c5d741c72ac05ded8f110151

      SHA1

      4ffcb358bcdb63a7016876b6437327f3d7c9e1a2

      SHA256

      c8a4cc8dc84ba8486463b6ac650102a1d0373fb4f4a5c1b3ba7d8015dcd6aca3

      SHA512

      043696a31148716248ff219cfaaf3d38c9b9fe18fc96960df0cebeab4035d32b514932350a9fb96c58eca51e529b7f33d18308b47af7ea4f29fb46a28b1b0f5a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      49be59e56e2a35c2ae6136cb279e81a2

      SHA1

      62d9ebee0ad6e7fa48859fca0b22240547f9a942

      SHA256

      47c60acffde3740428283b42d2f8020f33b7a8e70b03d82b03250bc2209f8cce

      SHA512

      ed911b76fd7187d7da5d4adb9b9f628d293d74af2a5e94cbdf8d7fce0151a3d84338bc4131a4dd686b2a0e46c469d8bcbf687620fb4c49aa79a6fc7f354bed98

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0a69a38958a689b156e3b92260a29e72

      SHA1

      197e56bb27919350e86e0f7590851d84638520f6

      SHA256

      d06d75899cb02ab06ab27eb79ad1cbb0b2985e47f93e659154880c5e1f1e944c

      SHA512

      c4ee59141c4d0ae0691a7b0d0bba6e6e96928f91867e1ae55e465277e841e2e816d3db5576a1d533e9a0afd09176648ce1f81ecb3af98be47b0ba265df5c218f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6bf28bcbcc6b394262afba695553cb55

      SHA1

      a999a0a61afe29a747f4fcbcf0a716da5e3fdbc4

      SHA256

      55c6b4be46a7fdb5bcf4b6ff5a581fdcd17ffe6e34e257337193d589548bde8d

      SHA512

      a2c667fc7a5b4d29cee686a7b458a7a3d74765a37e6a1257e542b23d2199f6a7d82d5eb788af5dbfc027233b684c27aecd337d0f4e4b5d27b4898e0680dd62fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ace69f99ff6367170fe9e7014e6f12b8

      SHA1

      bdca46b0e596d93ff0a0b806b7fa0656db519496

      SHA256

      1904de2b42a48c97ff06abb3378df6e77acf427be059475e6df9275b063aef17

      SHA512

      ee79ea3710e2ddcd1010cd73f4203eddf4a55eabfb9b16e394c3980a7995497996a06b2f6032c324acb1c1b03885204e60a3d2f10f66672dfaf6f036b2ed6e62

    • C:\Users\Admin\AppData\Local\Temp\Cab84C.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar92E.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2284-493-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2284-491-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2284-489-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2508-482-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2508-483-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB