Analysis

  • max time kernel
    118s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 04:37

General

  • Target

    a8067dd27c458b1570ee6ab91f5949e8_JaffaCakes118.html

  • Size

    685KB

  • MD5

    a8067dd27c458b1570ee6ab91f5949e8

  • SHA1

    92c82017854fbccafdef88175bace6839e950c37

  • SHA256

    96949441b68e28c71f0f09a3e6b76ed757720e1705fdb69946c3010b423afb30

  • SHA512

    95694a167e1cbf291e03b7d7a179e48b56f8f6ee978d7d56cf4294d5f711ac473549dbc9b1596daa8dbb754404e0c513c2ad7a27582b6e579f7c1acd325fc20d

  • SSDEEP

    12288:IY5d+X345d+X3t5d+X3s5d+X3D5d+X345d+X3+:IS+S+x+u+7+S+e

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 7 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 13 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a8067dd27c458b1570ee6ab91f5949e8_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2620
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2548
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2164
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:264
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:664
            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
              3⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:756
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                4⤵
                  PID:864
              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                3⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2836
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  4⤵
                    PID:2288
                • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                  "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                  3⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2156
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    4⤵
                      PID:976
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275464 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2596
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:6173699 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2168
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:537606 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2584
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:7943170 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:1692
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:7746562 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2308

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                342B

                MD5

                d47543a327f352986bee67723dfd084b

                SHA1

                28a838568989e6b223fadc84f9b781891d9dfc01

                SHA256

                0732c95161496ad7dc54295f865b0fc32af85e7e58658bb8699c540e44156790

                SHA512

                4d34ec1a61549e78f8375d51020bb1ffa79a2f99e5a09f9f9a92878b41655afa2fb96e4f5b72e651576e23b8d516f842372ce40e81197ac3fdf771c7198fa08a

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                342B

                MD5

                144498ad22144720ec635c9506f98877

                SHA1

                2b4c3851cc1d2b4550e336bbb29cd53e50c1f2ac

                SHA256

                d7ca6c32c138971e439b033c23bba9e9d661edd03678c93d2d47f012d54f00da

                SHA512

                3c3b85ba75e8abf647f05aa9b513cc293959c4c2ac888a5377312d5514b6e40a1a974372d1a7c96047d44edf94f8fff255ed8513e448800ecb70325f64772df1

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                342B

                MD5

                53ed1f3d94e0ed0db06621128904df8a

                SHA1

                3329bc0d40ef3a85e36f237a94f10a35cf208143

                SHA256

                05e4ad49019d574b84c0743ce4fddbf969185b5349e64e58842ddb6ccd8b91be

                SHA512

                a9c4edbf31f63fd1c01212650cd08246e2770c51133af09004329e2d4404252cd958ed83994efa84c2e1cf30bb0cd53da1b0d3cd81db8a48b1b9ae601760cce4

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                342B

                MD5

                aa52824392c330982d7cc8e95dbfd398

                SHA1

                4cfcb78e872404d618db898896e84df7b2245c6b

                SHA256

                e799e4eed48101bfb0e7c156d1933c7de026d5283998b33a08590d24f4463ab3

                SHA512

                7b07b80b1c6d96630c04a709539611289ad253f86b9a6bcaa67a59d87c6d4e0d655566c149b9412e9329c5ac372170f9e2eb9d40e5f8355ea65b0bd77c1d1fdb

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                342B

                MD5

                5e147e2451ddf9b346d21f38b8c693f5

                SHA1

                734c4435986eb44d2cffc8c6a30b5581e3176000

                SHA256

                dc973cec312619d79a4d293c1c54a32de31ca20ff4c69459140f05fe20f54220

                SHA512

                a854e323bbaf7473c9af8576d62a33f715571badc2b38c4bd15e1427617d9c5e8a84986ade35299cef5b310406ab9710d05e04c9699621ed52149a31182cf363

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                342B

                MD5

                c22de25e8bb07e83deedd3aa401ffe56

                SHA1

                27caaf7d6f9783f752779523d6aec95e04680f2f

                SHA256

                3b72bb0208d59686f445fdc0a7188576b414c53917dca6f731f97518df7ed1b3

                SHA512

                6201900476e99326049337f0690abd5b02c4fc9b431cc388f8280bcee64b645be47560a62a5316620e420013b8619429bc9f0afcbc48ff1c4c725de44ff8b335

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                342B

                MD5

                922512f7a47485708e8454843e6c5ed4

                SHA1

                d25d16f1e26549ecb6ecdae8294e5eab91d78cb8

                SHA256

                3b33643816c71125751e8f6a4552b45bb1247db56aa19b8315706317957b91b9

                SHA512

                598a4f36fc0e9bef2595e60356807db6f2a97da6cb36c13db22c450bbc9c79e7cb52ee56fa275b1e16c58274b6c48c889d55f0362377ec062ba5edfa326c4e21

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                342B

                MD5

                6e984cc1b6a9c3cc50fb6d0d1243295d

                SHA1

                64497ff913cecb6c0d16130c516986c2e78e7cdd

                SHA256

                49dcf4edda1b30044c3267214d943848c60458ce693e4597f62cd2b06b14476c

                SHA512

                8234ae25342b6f88273eee0b749c311bff6bf5190bc4ea7480e00f643c7c73dd19f7d75f13f47dafe03c45a7040a150babdb767dd528435ccc302cbda1084be7

              • C:\Users\Admin\AppData\Local\Temp\Cab5DF8.tmp

                Filesize

                70KB

                MD5

                49aebf8cbd62d92ac215b2923fb1b9f5

                SHA1

                1723be06719828dda65ad804298d0431f6aff976

                SHA256

                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                SHA512

                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

              • C:\Users\Admin\AppData\Local\Temp\Tar5E8A.tmp

                Filesize

                181KB

                MD5

                4ea6026cf93ec6338144661bf1202cd1

                SHA1

                a1dec9044f750ad887935a01430bf49322fbdcb7

                SHA256

                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                SHA512

                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

              • \Users\Admin\AppData\Local\Temp\svchost.exe

                Filesize

                55KB

                MD5

                ff5e1f27193ce51eec318714ef038bef

                SHA1

                b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

                SHA256

                fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

                SHA512

                c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

              • memory/264-30-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/264-29-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/756-34-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/1304-12-0x00000000001D0000-0x00000000001FE000-memory.dmp

                Filesize

                184KB

              • memory/1304-8-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/1304-9-0x00000000001C0000-0x00000000001CF000-memory.dmp

                Filesize

                60KB

              • memory/2520-19-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2520-17-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/2548-22-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2548-23-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2548-24-0x00000000001D0000-0x00000000001D1000-memory.dmp

                Filesize

                4KB

              • memory/2548-25-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2836-39-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB