Analysis

  • max time kernel
    140s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 03:12

General

  • Target

    a7ce97dc0fc4c70369f3e27e4fbb22dc_JaffaCakes118.html

  • Size

    155KB

  • MD5

    a7ce97dc0fc4c70369f3e27e4fbb22dc

  • SHA1

    4a7636e84d9e6c3ead97997c89ae4d5d53a76122

  • SHA256

    961fd1bb84e9f0af54888a5c60b98b83cc712dc30876c1ea91420cf3f89ab06b

  • SHA512

    411218f87a2340d6f5e3a6b4b6ab7916c94d82442616c76b101c147e36a30b01876faac436cb22b30270851ec788ffab23523c0056eafb57ffacf9e6c5bb0f91

  • SSDEEP

    1536:iqRTMHFSAj0v+nyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:ioInyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a7ce97dc0fc4c70369f3e27e4fbb22dc_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1532
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2772
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:209938 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1092

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      407d447b7128d0bbb065743411c386cd

      SHA1

      9e348e1dbcaa595b2b0abddad8c6f19d699ac6a4

      SHA256

      6b55f7ec01d7951d2f4461c6102bd29693eb883dcc7e79e76c46b794fd6b364d

      SHA512

      1ae13f048054ce32a302c4f5c8b09c6e806d22242650ff809f7b21e1d523bb279f76d1121546a79d721c7605e2812be5448e0ba7e5737fb0845082b7437d1306

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3ec27638a4f76bddb78d447b558548f0

      SHA1

      3801029dd24c7498f37a9777aae64662d6ef8c72

      SHA256

      9dbabcd97a239275938dbbd2e57d2faae389b0fe1d87a9256379f028667a1895

      SHA512

      0053bf47c23a11695a04775efffe44c38d71f040b077e1d7f963898fdc045e3363beaedc12059f94a8e68b2362261efb4e99324aac9142de510186443637f57e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      18c6649c6d66c38699319ad7c3a7c330

      SHA1

      f7c06a37c83db570d4cf6899a94271d16522617c

      SHA256

      4d5201a8ebe83e27d1e8b395ea42de6c73eafa18e60decac259e05363b2f37f1

      SHA512

      7a1fadb91c89f9db6ba750f6b5232c2aa61ca48caf9bd66794dfe120bd055fadce8b282f7ee6997db409cbea1c2cf65ef53c9d69017b1ac5ed9d85be05db0b6f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e157517d87427b2759b02d63c91f735e

      SHA1

      66af2cfa4ef746ba61868d7c8aae6fd85eb74042

      SHA256

      b7b4274fdfbf9a61c3780f3a1274360ced859cda5a49e39efa1929485a687815

      SHA512

      528cdf9fa5f661ea9022b4e1b753137fa0f079be3b7757690e9db3b77f4a29e0097e1313dbbfcf0d3abd1b589c51b219fbdeecca9c7fd3fe14bb1af888290cb6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      fd3c564af69686d2a3d6a4a1c1ee7eec

      SHA1

      2ed5175a5e30202f256d057edfc9d55b25e64980

      SHA256

      6e21c33a99684b93055844d383692c11c6e9917ed763c0098ee18a48d8ab347d

      SHA512

      8f1a41db0e5da356f5d76c0f39b2fdcb2ae563d4f54cf539d36e52a6e16d83a4d7986afe23b70025ca0fa6dcc96c01ebb85f2553cc87da9947c6f6ce30afcb71

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7401675eb526fbfff139dbf9e68262fd

      SHA1

      8b31ac683ddc7a6e4a79856a12b22c4da26c3ecc

      SHA256

      be11c95bb3ee4a182485ef382d215ea2760f6ec5e2ead2ae699c9063553890d6

      SHA512

      6df01e4f2e69e9eb4f611492586dcba1a314ace0e96bbf1cd2cd06919875d484f0b8485901ea0b012a39d028ea021bfbc7e92fabf8a1677c93150170512af73c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5931209a1fa29e912604dae6d75c6408

      SHA1

      2f233bd31458e681a93b7fd664ab6c198fc2ccde

      SHA256

      4862aa017636ebeb32a6918b7e6a791d5dfe877143869f366939245e0a253b1c

      SHA512

      0a79071ad7b417e81d9a453776443038207cdcd8eb3106dafbe9cbc66d5bd15ea3f2052ab5ed1fd1fe9cdfe94db86a405de95c6b6189067e4c54419e068a18ec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      06b560d5c4f99205a528dcc66fb2f0d2

      SHA1

      57e2828d022181a6f57c82f98c0f2fb87a7e4022

      SHA256

      27039a93037864d322eb613cb9f4f88a1611d6e19f69055938831abe0b287fe4

      SHA512

      106f057d215860e98ef526898ce0ad328f7befaaffc47c03c3428fa7a7efdf603a1bd400c75c1e88fb54eedd4ecc9712232e941423b4757524740e15a93a3c43

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b0705474978787a823687af3836fab67

      SHA1

      6c9ab8409e3ef56a5ddd7deb67494783854ba0ec

      SHA256

      d56384225a4fe469ace8ce44d949b74e51f4275bf36177c604f9d54e7afdd150

      SHA512

      a4a40e16e942d3e59504440163bd4dfc5890a32e2c2717107eb48178fc013f51dce0bb328f9826036e2db21076755796be13a52bc896bf6b9ea8e9d153bf34d6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c5b5a9aedf2d848e937e9fd21d2d58fe

      SHA1

      99506a25309a860435809fb6afd9844123e663a5

      SHA256

      3f8c3363b6299be21c15731c4215ea2cd11e7e5d5d42406c59df0454fdfb2746

      SHA512

      e33802651fb088204d03aa7c6590d90257861ed39acee9f61dc58b0dca9909e441624efeac5659728f3f0bbd1f6b08a0d69227b90f37def3356a2532c4eb3416

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      055d2167e910358f824d21a1cb587f84

      SHA1

      eaff0f9693b90c9fe40c4633dd6cafd3fbda6a13

      SHA256

      98f1fe789e370019a7f51aee3bc8e109dfb169eef41c263717001b24f41752e5

      SHA512

      0faac642ce995ce3fe15cfc44ae4e3b8646495ebea546dd887d2747b1ce4273a04b54fb524221f231bda3b518ae9f57bf8b1e9fe72b8219f825d182f628295b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8690417cf00856fa6130f68e1b35be38

      SHA1

      0645a9e7e26d50e265f5c6ebc945359b53cefefa

      SHA256

      26817a99bb1c3723db9fbe24ae9d38c478a682328233a2361c3da1391c54a314

      SHA512

      b76bfa79125269777b5e17bfea06b9083aabdcaea941d5e8a1f69c97ee0ce9baeb3f03924124c73c9cf4011fd268194343b09c0371d92e1a3a4e2e3cd6399b15

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6e53d8d90e91a9485017dd23d5b89c9b

      SHA1

      f881ddd257cfcfbf512e5755919385328cc5a3c5

      SHA256

      fce40a8ca1c16ae93976918f1a1fda3cdc0e808b9ead9bdabb4b8ce450598f14

      SHA512

      311226a370817e8e417f52e5a4b928f5c0aaf28c76477d9a4f37318398fef14c9f8b0aff0ef101642feff4028333802b845920398c456f3ebc636f89d2f4c9a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      21f487d5e8004fc0f7fb5b9ddb4b98df

      SHA1

      2556ee213625d5f0ca2fdd4dd8ae16f6d0ce5725

      SHA256

      953e8b63f642625f8ca94e143284af30d9124dee06ef7ced0a1cd87fb4bbb9a4

      SHA512

      7f976bf9ba56869a0e034cd0824d830f14e7a665b9b75afbf33c7c2a565febbd6e55c72d0b517508151e232e99774005309893d353b240d8cae814486fd66e49

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6aeee34c8b3e451b84f6835c07f0347b

      SHA1

      5d1e5886b9cbde2f1b7b6e2c5a545ee2b598280d

      SHA256

      01625faf345cab34a33cb552565111fa38db19c62a2a83972aeff7e9e514b9df

      SHA512

      ae63c7f19b138432ce3bb7a3dc56afafafd73d9cd191d5fc941d2c302907bcc851c9b54948913ee6fd4b3b343194486511ab450e1241ce9183f685707ea9d29e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      4e07a8ede07266a40120e265a000824f

      SHA1

      0dabeb722854fe58914b5f407a1811274f5ba491

      SHA256

      5ac41f25d91ae9f340e0e11eca609acc07457f4c876ec8d40fba56d116c172fb

      SHA512

      ed6c4ebe36a9678b034d5fe6a132856cb9086d771b61b0f93a4df663fd3526118446bff6b272d9a96451e07725e17ec117265d90633e6766a5ef685379b92ca4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0f58286f141d38fd0cf48780b37c967d

      SHA1

      e100ca71322a51ed97a15f739e482ce3fa02ffaf

      SHA256

      68959cd3b4e1bff489fc107562b3684b8c7fd269e90c68d2284c0635b4f95e2f

      SHA512

      1220fc19c379d1b26224d4cfe371f48e541e5e94ed27395e01819c81c8e35957f5161b114dca56974e7e51ea189e1595147306c19f9ccb4d9c462899a631b551

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e8706c42cbd246c9f61a99a289d722e5

      SHA1

      9df790eeff9b68fcf6de25102aaf259eecec767c

      SHA256

      002950ec8ff410ce6b1c1caa9b5d169aed4de908d7cc988178bc4018283ab38c

      SHA512

      9d0f91e282dba6728f836e6f3b20d60a6a714f2f00e8d3706521d9e971192d457aaa0def19f4df1c853ce43779bb27594bb6f049e5921eb229576dbc30ed7acd

    • C:\Users\Admin\AppData\Local\Temp\Cab8269.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar831A.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1080-438-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1080-437-0x0000000000230000-0x000000000023F000-memory.dmp
      Filesize

      60KB

    • memory/1080-434-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1532-445-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/1532-447-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1532-446-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB