Analysis

  • max time kernel
    120s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 01:44

General

  • Target

    a79933641427d0578e831dab0543eb5a_JaffaCakes118.html

  • Size

    115KB

  • MD5

    a79933641427d0578e831dab0543eb5a

  • SHA1

    bee404fcb55dd0fa65678138ca6c5a5a8599f187

  • SHA256

    e430c1d3fa93d35d88e5e62720e11097ae799feae2efadb361d444cee1c048e1

  • SHA512

    a03dc030217361dd83d06549a067960bb9d8cc8d83bb1b0fa17b90cea5e081b8da0fdada5225d4dd3067441e40b45cb8e61e3df7606e0abdc23db696f4e6f945

  • SSDEEP

    1536:SnyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQy:SnyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a79933641427d0578e831dab0543eb5a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2364
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:406533 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1132

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      dc8218cde32eb13d3be5252249830876

      SHA1

      33910bad91d6363681c3e4b372eba12133244765

      SHA256

      9eadcf87ce241af1fa1ca40ce11117d67db6692acd3909b5264adc757e0a6344

      SHA512

      d3d9f44c653f2c9dd8bc35ac717bfd27d3e1a978390477c6c38dfddcbaff608c2af1b2c433c91a6f2356dc42d19802cc0c0de69b68c80bb6e1d96c0490fb6bff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ab1192e378440ae7d587c7ef7a2441e0

      SHA1

      4d00354519279545a4711a816b85749e48e32c25

      SHA256

      20593204674cce5f0835bd9086d39f3785b99125bbbb29c3e623e746cbc775f6

      SHA512

      669951db491ebf82ea4bc221c303d011c2d20b87815e386ab991adc00aeac893a9905d06ee33e27a3d5acde4630c628b3b7d9f6a2faed1ab48ce6a5b47e17284

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1055b2752db364715492b89c9599adf3

      SHA1

      1e06bc0b7bec3cc5cf6857b01bae3ccf42ea5e8e

      SHA256

      fb1c2d774ed57b538df4d61b75403cbbf17655b2e8418d351a728ee9b6ad898b

      SHA512

      4e88e72593b29860113b136a82131d3b88cafe90e96ce4536a33c1e9badfe96b38646e0b3de44649527ab15e71d7a3f02b084b540b238fc26edf1c5265e3a021

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7733e45a25b9ce6c8e4ee1f197f86eb5

      SHA1

      4676e223a031790e5b180bae606c67289adf8d28

      SHA256

      ec2a6fdbd242d4f993db008820a72755d848c1a98bacc6bfd81fda50d33db005

      SHA512

      55dc920b34069e3fc409a91779d5ded980cec4876b6b12d449e39a1cedd7873a0b8667e2959b5d03b3272d75081650d43c7adf81b671859ffa80a85fb6658679

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      52ebf92ec183064fb94684ee3009d9f1

      SHA1

      04dcc7e9dc0265dabea1abe0b070177285392e89

      SHA256

      29b9656cbfa0e93e47fe8ded87322e114b07e315d14aab0da96aaaba5cbe2faf

      SHA512

      b7db8d0d2d3d13fa8c63e22ec817a409b391f337f4a655ca6e6a9a076f61696b60f734baa1881d7e312bc973855021a0b83465e0332b6a5c65bf4cf9c431fca3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      10264d61c545939b6994b773f16ae7fd

      SHA1

      29cf14093846c5266b6fc3154778fe35df6a789d

      SHA256

      365d0fda3f727b95c7e45fedd1558e1b5c2d987235712849fc7e3847e2e6cc85

      SHA512

      bb00415a67e7392d12d33171f47e2c2da7ac5df1e692b2f9ee5cb59548eaf8c6d61e47e360eff086f7d3fc3af2009154dd6d2e6dbc960c20a77731daedaaafcc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3c7492ca03df263dd4aeca0e00b2e7c2

      SHA1

      8a290729a227792865be14ce827fcf073ba0cef1

      SHA256

      ca475bf711fdd3436bd8e242cb03ca65b378437099d37308cd0262f325a65bfe

      SHA512

      1a3cde64c5d519e733be6756aefcd1cb1e34cf60df7c23064c24990731477e7c8e851a2e67fb420c56e57a9b0a8f81f5c82a2db7998e749d15cf1bc21f565257

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8e6f0815aacd0cffa39fd1f6533b1b62

      SHA1

      d2db0abf8d855c5f521cc97b01b242a6f1aa311f

      SHA256

      5da88e1165a026c9120eaeba405477ea8f39be349b6f9bd1e88eb580183e30d7

      SHA512

      24d9430e5291cf68c9a3daf5dfcc65d88d30b364e7100b7083a8b94484c05755874935c7cbb67b170efd01ace62b21c6a672eb5721bbd8db90b43337eadf6c7d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f58e41610df63235cf5a40e63a142ac8

      SHA1

      ca794fb49a84a122ad78eb4e57727840d77fceba

      SHA256

      5130f58902e2926ad28b5632b360ad129dd1c9e0238d0608874c7cec2df9ab02

      SHA512

      d471f820e50ef13b065ca4fbeabbbecdec72cbc809cf1af3160aff52a123d3a47c73bbcb1e0b0b1270fabb71b8179dd7158709c527d0d35de4fb42845e8e225c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2b9a0d2d3285f3e77bc2ee6d7c5dba68

      SHA1

      236c28dddd6a95d1add47eb39f41252ac2be788e

      SHA256

      aaef7d796eec7f407964ff4f4abead58d6b4c5630f66b1ea4f0c3a03e14559c9

      SHA512

      6c99a9fc18cfde2eb966e24d00e333efe8567e99b521fcf972ccff812b2914ac3044c872a0065cf0d1e2281ec32315d1d8e23d58c85477219b597b8a8c8f0752

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c78b769f1acc3e9863eb5c01fdf39d2d

      SHA1

      5632c60644322ebcd376b5b3ad03323a08e3d17d

      SHA256

      6897bf5e9ca8f9d088f522bd6c1b5fcf74a1503195055c8eff570df8c97615a9

      SHA512

      f39b31432389011c77338d10dbd626fc03406898ddbe9495c03d63ff224895a0f40a3658293235d39701a18685c5a890b9b388c16107103a57d152e2523e6fd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1eead19f959f47c3468effb3800ca7cb

      SHA1

      dabd8906e1aa217cbe45d5b4959f264b514723cb

      SHA256

      0c9dfd73d8272a0165751fb4d237a233b2e90277b01863f7811106640260719c

      SHA512

      40e716efbd66c0d03d0985db0de590a89f733699c8724cc4a1e3511ddbb1758062ac391b99e7a0be8bf4d672e363229be16ba1e7e54a592d41895d5516b7294e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      bcc10268c6e33c87ecae5bc78cf02dd1

      SHA1

      d6604c9bbe11997976879b9bff93d67c9775698f

      SHA256

      757f615ce30f2907e2bb8c8b6481d91e888cf8bd3f2e8cce7190f015013de84a

      SHA512

      9910151e30a3af6a7a01804479403a1118960d26f0578d80f0d345ddc0ef31b78d6ebf802e95ff553ab12ad5aa25a29122fd9c3a0987c284c95794d9d5d808bc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e5d2a5d1ac3f3118af36e70a7e262974

      SHA1

      7ab8d1815d7215926c1ab8d0f496b52110a6a88d

      SHA256

      dc2e011e93499be976052b9c730f2d6a4c5c7c4e254197a362073a9c3dcdf31c

      SHA512

      506c1c0ea350328e7627821ee9decc6e131bfe1a38e038e627853e300394125dc137d2a5b2f8ef470c96cea1221fe78a249ef46c30c1f4bf3c33f1b0063c5667

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c4a0427a2d0b7783d9893f28ef8e9647

      SHA1

      abb6ce38493af3834ac42a77fd06e1f1d96c2ebf

      SHA256

      b8e7c8c5e456593ba157d2cb4216deb79f8776285b1a8b2932563eb4876c4e41

      SHA512

      a7617f461ca0933ce5c300d1e8a90188af05d687a901e25aa795d0f68c2b812f56eee2ea5d869cd09606765acf000b56bb7d6e6c05068185d68c6cca5b562ed4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      58f8d2330c5e9c66a40a55111da78ed3

      SHA1

      1b1aded535541ec0de3dd04e0d932813ae5e0804

      SHA256

      974dab64eaf9c2adf81ff798aaf73b0c05a301b13668618cf4e4eeece154b4f4

      SHA512

      dc316dc5c8a9eb5d93521ca5143ed98cca54b8a186b993933cb721d16848ee4cc1b3dca146e89a62c5f67b42f31441472dcd69cefd9eef084c22726f523ea535

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d78e0691915d11f56069cf803c66d01f

      SHA1

      f51623fce19eb6ee1474ca05d164656f5141e280

      SHA256

      e20873d0b7e0caaa31794bd210326cd04d4cbb52518f26a171b73112e06b0a11

      SHA512

      11ca450a7213713acdbf515d1722e53963050206c670843e1e81e149ff401d67607a149e575e4cf24de28fb865556b65529d8dec9bfa5fb5cbbfe78c4b996a30

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      78da2524bbae84e5ceec1908b039fc99

      SHA1

      5573b372d656ce81f31a0140be82fca111897cca

      SHA256

      0dee65f05251527a71317566bcc1be0855678fab8002f245c0105d532a2e2e23

      SHA512

      e657c840c8fbf824bf7651ce8a65c789fed08164765c0f27cc42d8f675cf1846504f62314cb150c7151093b2bba30e7d5c96be4648f5375b4428427d0ea53d5e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f405c756f0b86da8fdb4a28c3b8bc639

      SHA1

      edeba81c0c1f77e87a09de705ae60cb609717dda

      SHA256

      41e8ffb1b4120fbf73969e78134d8d271e386ae15e2efd6244c6c764456bb9b6

      SHA512

      162daf38ee66f772b71c14415c1cf6128dab54966ae60579247197df01031f8de8f99497beec2a9b07d1ef24115a4a064cb05effbe69231e60541236e49779f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9e2d343e86f764e8ecbc7f77854cafda

      SHA1

      94de598adf6e5a15e03b12d9e1a242aa8660f695

      SHA256

      51891bba04798265fb3d7076e0893bf0beba5bfecda3459a8f91907f6fff9528

      SHA512

      7b19371e52d84bbdc35a84394e2117745cb5b0d20abc530d617edde37309228df47f56c148fab022bac1a763bec610e04764d6663d4f28d88e520cdc83932811

    • C:\Users\Admin\AppData\Local\Temp\Cab3A44.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar3B17.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2836-20-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2836-16-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2836-21-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2836-19-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/2836-18-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2900-6-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2900-9-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2900-8-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB